#github

共收录 70 条相关安全情报。

← 返回所有主题
INFO
ADVISORY 2026-04-30

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Impact An unauthenticated attacker could register a malicious MCP OAuth client with a crafted `client_name`. If a victim user authorized the OAuth consent dialog and a second user subsequently revoked that access, a toast notification would render the injected script. Clicking the link would execute arbitrary JavaScript in the victim's authenticated n8n browser session, enabling credential and

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact The `dynamic-node-parameters` endpoints did not verify whether the authenticated caller was authorized to use a supplied credential reference. An authenticated user with access to a shared workflow could supply a foreign credential ID in the request body, causing the backend to decrypt and use that credential in a helper execution path where the caller also controls the destination URL.

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact An authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. - This issue only affects instances where the Python Task Runner is enabled. ## Patches The issue has been fixed in n8n versions 1.123.32, 2.17.4, and 2.18.1. Users should upgrade to one of these ve

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact An authenticated user with a valid API key scoped to `variable:list` could read variables from projects they are not a member of by supplying an arbitrary `projectId` query parameter to the public API variables endpoint. The handler queried the variables repository directly without enforcing project membership checks, bypassing the authorization-aware service layer used by the internal e

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact The MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact The `/chat` WebSocket endpoint used by the Chat Trigger node's Hosted Chat feature did not verify that an incoming connection was authorized to interact with the target execution. An unauthenticated remote attacker who could identify a valid execution ID for a workflow in a waiting state could attach to that execution, receive the pending prompt intended for the legitimate user, and subm

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact An authenticated user with permission to create or modify workflows could achieve global prototype pollution via the XML Node leading to RCE when combined with other nodes exploiting the prototype pollution. ## Patches The issue has been fixed in n8n versions 1.123.32, 2.17.4, and 2.18.1. Users should upgrade to one of these versions or later to remediate the vulnerability. ## Workarou

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Impact A flaw in the `xml2js` library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. #

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 16.4
Conf: 50%
GitHub Security Advisories

## Impact OpenClaw deployments before `2026.4.21` could treat a non-owner sender as authorized for owner-enforced slash commands when all of the following were true: - a channel plugin declared `commands.enforceOwnerForCommands: true`; - the channel accepted wildcard inbound senders with `allowFrom: ["*"]`; - no explicit `commands.ownerAllowFrom` was configured. In that state, `src/auto-reply/c

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 16.4
Conf: 50%
GitHub Security Advisories

## Impact OpenClaw deployments before `2026.4.15` could embed host-local audio files into webchat responses without applying the local media root containment check used by other media-serving paths. If an attacker could influence an agent or tool-produced `ReplyPayload.mediaUrl`, the webchat audio embedding helper could resolve an absolute local path or `file:` URL, read an audio-like file under

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Summary The Admidio inventory module enforces authorization for destructive operations (delete, retire, reinstate) only in the UI layer by conditionally rendering buttons. The backend POST handlers at `modules/inventory.php` for `item_delete`, `item_retire`, `item_reinstate`, `item_picture_upload`, `item_picture_save`, and `item_picture_delete` perform CSRF validation but never check whether t

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary The `contacts_data.php` endpoint uses a weaker permission check (`isAdministratorUsers()`, requiring only `rol_edit_user=true`) than the frontend UI (`contacts.php`) which correctly requires the stronger `isAdministrator()` (requiring `rol_administrator=true`) and the `contacts_show_all` system setting. A user manager who is not a full administrator can directly request `contacts_data.

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary The `add` mode in `modules/documents-files.php` accepts a `name` parameter validated only as `'string'` type (HTML encoding), allowing path traversal characters (`../`) to pass through unfiltered. Combined with the absence of CSRF protection on this endpoint and `SameSite=Lax` session cookies, a low-privileged attacker can trick a documents administrator into clicking a crafted link th

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary The `ecard_preview.php` endpoint does not validate that the `ecard_template` POST parameter is a safe filename before passing it to `ECard::getEcardTemplate()`. An authenticated user can supply a path traversal payload (e.g., `../config.php`) to read arbitrary files accessible to the web server process, including `adm_my_files/config.php` which contains database credentials. ## Detail

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Summary Several administrative operations in Admidio's preferences module (database backup, test email, htaccess generation) fire via GET requests with no CSRF token validation. Because `SameSite=Lax` cookies travel with top-level GET navigations, an attacker forces an authenticated admin to trigger these actions from a malicious page. ## Details In `modules/preferences.php`, the `backup`, `

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Summary An unauthenticated attacker can execute arbitrary JavaScript in any Admidio user's browser through a reflected XSS in `system/msg_window.php`. The endpoint passes user input through `htmlspecialchars()`, which does not encode square brackets. A subsequent call to `Language::prepareTextPlaceholders()` converts those brackets into HTML angle brackets, producing executable markup. ## Det

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary `Role::stopMembership()` does not verify whether removing a user from the administrator role leaves zero administrators. The deprecated `Membership::stopMembership()` contains this safety check, but the current code path bypasses it. Any administrator can remove the last remaining other administrator, locking the entire system out of administrative access. The exploit does not require

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary A logic error in Admidio's two-factor authentication reset inverts the authorization check. Non-admin users cannot remove their own TOTP configuration, but they can remove other users' TOTP, including administrators. A group leader with profile edit rights on an admin account can strip that admin's 2FA. ## Details In `modules/profile/two_factor_authentication.php` at line 84, the aut

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary The member assignment DataTables endpoint (`members_assignment_data.php`) includes hidden profile fields (BIRTHDAY, STREET, CITY, POSTCODE, COUNTRY) in its SQL search condition regardless of field visibility settings. While the JSON output correctly suppresses hidden columns via `isVisible()` checks, the server-side search operates at the SQL level before any visibility filtering. This

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 16.4
Conf: 50%
GitHub Security Advisories

## Summary The OIDC token introspection endpoint (`/modules/sso/index.php/oidc/introspect`) always returns `{"active": true}` for every request, regardless of whether a valid token is provided, whether the token is expired, revoked, or completely fabricated. The endpoint performs no authentication of the calling resource server and no validation of the submitted token. Any resource server that re

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Summary The SAML IdP implementation in Admidio's SSO module uses the `AssertionConsumerServiceURL` value directly from incoming SAML AuthnRequest messages as the destination for the SAML response, without validating it against the registered ACS URL (`smc_acs_url`) stored in the database for the corresponding service provider client. An attacker who knows the Entity ID of a registered SP clien

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Summary The Admidio SAML Identity Provider implementation discards the return value of its `validateSignature()` method at both call sites (`handleSSORequest()` line 418 and `handleSLORequest()` line 613). The method returns error strings on failure rather than throwing exceptions, but the developer believed it would throw (per comments on lines 416 and 611). This means the `smc_require_auth_s

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary The optional flag `--filter-system-calls` was not applied even if specified. ### Details This is a defense in depth feature to apply additional seccomp filters after the binary has started. The example config also sandboxes the binary with systemd. ### Impact Reduced sandboxing of the netfoil binary.

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary Rules could be bypassed by changing the first character: `example.com` could be be bypassed by e.g. `fxample.com`. ### Details Off-by-one error in the suffixtrie implementation. ### Impact The domain filter could be bypassed. Please note that DNS filtering alone is not enough to block malicious traffic.

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Impact OGC API - Process execution requests can use the `subscriber` object to requests to internal HTTP services. ### Patches The issue has been patched in master branch and made available as part of the 0.23.3 release. The patch disables any HTTP requests made to internal resources by default (unless explicitly defined in configuration by a new `allow_internal_requests` directive. The com

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Impact A raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories without authentication. The issue manifests when pygeoapi is deployed without a proxy or web front end that would normalize URLs with `..` values, along with a resource of type `stac-collection` defined in configura

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary A critical Denial of Service (DoS) vulnerability exists in `marked@18.0.0`. By providing a specific 3-byte input sequence a tab, a vertical tab, and a newline (`\x09\x0b\n`)—an unauthenticated attacker can trigger an infinite recursion loop during parsing. This leads to unbounded memory allocation, causing the host Node.js application to crash via Memory Exhaustion (OOM). ### Details

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 13.4
Conf: 50%
GitHub Security Advisories

### Summary Versions of `i18next-http-middleware` prior to 3.9.3 pass the user-controlled `lng` and `ns` values from `getResourcesHandler` directly into `i18next.services.backendConnector.load(languages, namespaces, …)` without any sanitisation. Depending on which backend is configured, the unvalidated path segments enable one of two attacks: - **Filesystem path traversal** when the middleware i

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 包含 CVE (+2) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

The `BetaLocalFilesystemMemoryTool` in the Anthropic TypeScript SDK created memory files and directories using the Node.js default modes (`0o666` for files, `0o777` for directories), leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent sta

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-30

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Impact A vulnerability in `datastore_search_sql` allowed attackers to inject SQL in order to gain access to private resources and PostgreSQL system information. ### Patches The issue has been patched in CKAN 2.10.10 and CKAN 2.11.5 ### Workarounds Disable the DataStore SQL search (`ckan.datastore.sqlsearch.enabled = false`). Note that the SQL search is disabled by default. ### More informa

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 16.4
Conf: 50%
GitHub Security Advisories

### Impact When `n8n-mcp` runs in HTTP transport mode, authenticated MCP `tools/call` requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most notably `n8n_manage_credentials.data` — the raw values can be persisted in logs. In deployments where lo

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 12.4
Conf: 50%
GitHub Security Advisories

### Impact The output of `cilium-bugtool` can contain sensitive data when the tool is run against Cilium deployments with WireGuard encryption enabled. Users of [WireGuard Transparent Encryption](https://docs.cilium.io/en/stable/security/network/encryption-wireguard/) are affected. The sensitive data is the WireGuard private key (`cilium_wg0.key`) used for node-to-node encrypted communication `

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Summary After a note-mark owner soft-deletes a public book, its notes and uploaded assets stay readable at `/api/notes/{id}`, `/api/notes/{id}/content`, the slug URL, and the asset endpoints. Unauthenticated callers who hold the note ID or the slug path retain access. GORM's soft-delete scope does not reach the raw `JOIN books ...` clauses used by the note and asset queries. ## Details `DELE

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Summary `IsPasswordMatch` in `backend/db/models.go` falls back to a hard-coded `bcrypt("null")` placeholder whenever a user has no stored password. OIDC-registered users are created with an empty password, so anyone who submits `password: "null"` to the internal login endpoint receives a valid session for that user. The bypass is unauthenticated and requires no user interaction. ## Details `

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

**Summary** The zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessi

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary Heimdall performs rule matching on the raw (non-normalized) request path, while downstream components may normalize dot-segments according to [RFC 3986, Section 6.2.2.3](https://www.rfc-editor.org/rfc/rfc3986#section-6.2.2.3). This discrepancy can result in heimdall authorizing a request for one path (e.g., `/user/../admin`, or URL-encoded variants such as `/user/%2e%2e/admin` or `/us

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 9.4
Conf: 50%
GitHub Security Advisories

### Summary `_clone()` validates `multi_options` as the original list, then executes `shlex.split(" ".join(multi_options))`. A string like `"--branch main --config core.hooksPath=/x"` passes validation (starts with `--branch`), but after split becomes `["--branch", "main", "--config", "core.hooksPath=/x"]`. Git applies the config and executes attacker hooks during clone. ### Details The vulnera

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 16.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Output from webhook-triggered isolated cron agent runs could be queued into the main session awareness stream without `trusted: false`. That made the event render as a trusted `System:` event instead of an untrusted system event. This is a trust-labeling issue

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 16.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact The Control UI assistant-media route authenticated trusted-proxy callers but did not enforce the declared operator scopes for identity-bearing HTTP auth paths. A trusted-proxy caller without `operator.read` could access assistant-media files and metadata that w

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Workspace MCP stdio configuration could pass dangerous process-startup environment variables such as `NODE_OPTIONS`, `LD_PRELOAD`, or `BASH_ENV` to the spawned MCP server process. In a malicious workspace, this could make the MCP child load attacker-controlled

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Workspace `.env` loading did not reserve the `OPENCLAW_` runtime-control namespace broadly enough. A malicious workspace could set variables such as `OPENCLAW_GIT_DIR` before source-update or installer flows, potentially steering trusted OpenClaw runtime behavi

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Feishu card-action callbacks could synthesize a message event with DM conversations classified as group conversations. That skipped `dmPolicy` enforcement for card actions, so a sender in a Feishu DM could trigger card-action flows that should have been blocked

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Templated hook mapping `sessionKey` values were treated differently from request-supplied session keys. A hook mapping could render an externally influenced session key even when `hooks.allowRequestSessionKey` was disabled, bypassing the intended routing opt-in

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary GitPython blocks dangerous Git options such as `--upload-pack` and `--receive-pack` by default, but the equivalent Python kwargs `upload_pack` and `receive_pack` bypass that check. If an application passes attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, this leads to arbitrary command execution even when `allow_unsafe_options`

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
MEDIUM
ADVISORY 2026-04-29

No Title

推荐 16.4
Conf: 90%
GitHub Security Advisories

GitHub 安全公告披露了 npm 包 openclaw 中的一个中等严重性漏洞。该漏洞影响 2026.4.20 之前的所有版本。openclaw 是一个代理框架,其 operator-trusted(操作员信任)的网关配置修改接口(如 gateway config.patch 和 config.apply)未能完全覆盖所有敏感设置,包括沙箱策略、插件启用、网关认证/TLS、钩子路由、MCP 服务器配置、SSRF 策略以及文件系统加固。攻击者可利用提示注入(prompt injection)手段,诱使拥有网关工具访问权限的模型(Model)执行配置修改操作,从而持久化更改这些本应由操作员控制的设置。这属于模型到操作员的守卫绕过(model-to-operator guard bypass),并非远程未认证的网关直接入侵。攻击者需要先获得对模型的提示注入能力并使其拥有网关工具权限,攻击复杂度较高。修复版本 2026.4.20 引入了更严格的守卫逻辑,阻止模型驱动的网关配置变更覆盖更广泛的 operator-trusted 路径集合,并覆盖了逐代理覆盖和数组条目修补场景。

💡 风险点: 该漏洞允许拥有网关工具权限的提示注入模型绕过操作员守卫,持久修改沙箱、认证、SSRF等关键安全配置,可能导致后续更严重的安全控制失效,需引起重视。

🎯 建议动作: 立即将 openclaw 升级至 2026.4.20 或更高版本;若无法立即升级,请审计并限制模型对网关工具(尤其 config.patch/config.apply)的访问权限,监控异常配置变更。

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
MEDIUM
ADVISORY 2026-04-29

No Title

推荐 16.4
Conf: 90%
GitHub Security Advisories

OpenClaw 是一款包含代理工具集的安全管理软件,其工具集中可集成 MCP(模型上下文协议)和 LSP(语言服务器协议)工具。在正常情况下,代理会通过工具策略管道(如工具配置文件、显式允许/拒绝列表、所有者限制、沙箱策略等)过滤核心工具。然而,在受影响版本(< 2026.4.20)中,捆绑的 MCP 和 LSP 工具可能在正常策略过滤完成后被追加到代理的有效工具集中,导致策略绕过。攻击者若已配置了捆绑的 MCP/LSP 工具源,并且管理员设置了本应限制这些工具的策略,则这些工具仍可被代理使用,而违反策略约束。该漏洞需要本地配置条件,并非未经验证的远程网关入侵,属于中等严重性的本地策略实施绕过。修复版本 2026.4.20 通过在合并工具集之前对捆绑的 MCP/LSP 工具执行最终策略检查,覆盖配置文件策略、提供者策略、全局/代理/组策略、所有者过滤、沙箱策略和子代理策略等,确保捆绑工具也受到策略约束。

💡 风险点: 该漏洞允许本地代理绕过管理员配置的工具策略限制,使本应被拒绝的捆绑 MCP/LSP 工具仍可被使用,削弱了安全策略的有效性。

🎯 建议动作: 立即将 OpenClaw 升级到 2026.4.20 或更高版本;检查现有策略配置,确保捆绑工具源被正确处理;审计日志中是否存在策略绕过迹象。

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
LOW
ADVISORY 2026-04-29

No Title

推荐 16.4
Conf: 90%
GitHub Security Advisories

OpenClaw 是一个 npm 包,用于管理物联网网关上的设备配对。该漏洞涉及同一网关下不同设备之间的授权问题:当一个设备会话(非管理员)通过配对方式连接到网关时,其配对范围本应受限,但实际上它可以枚举全局配对状态,并能够对同一网关内其他设备的待处理配对请求进行操作(如批准或拒绝)。攻击者需要先获得一个已配对的非管理员设备会话(即需要一定的访问权限),然后利用此漏洞影响同一网关下的其他设备配对流程。该漏洞不是远程未授权漏洞,危害范围有限,但违反了最小权限原则。修复版本 2026.4.20 将配对管理操作限制为仅允许调用者设备操作,从而阻止非管理员配对设备越权处理其他设备的请求。

💡 风险点: 该漏洞可能被利用来干扰或破坏同一网关下其他设备的配对过程,虽然需要已有设备会话权限,但可能影响设备部署场景中的可用性和预期行为。

🎯 建议动作: 立即将 openclaw 包升级到 2026.4.20 或更高版本,并检查资产中是否存在受影响版本的部署。

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Browser profile creation normalized `cdpUrl` values before persisting them, but did not apply the configured browser SSRF policy at creation time. In deployments that explicitly disabled private-network CDP targets, a stored profile could still point at a priva

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

### Summary The application fails to validate the ```nick``` parameter during a ```POST``` request to the ```EditUser``` controller. Although the UI prevents editing this field, a user can bypass this restriction using a proxy to rename any account (including the Administrator). This leads to Broken Access Control and potential Audit Log Corruption. ### Details The vulnerability exists in the use

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 9.4
Conf: 50%
GitHub Security Advisories

### Summary CoreDNS' DNS-over-QUIC (DoQ) server can be driven into large goroutine and memory growth by a remote client that opens many QUIC streams and stalls after sending only 1 byte. Even with a small configured quic { worker_pool_size ... }, CoreDNS still spawns a goroutine per accepted stream (workers + waiters) and active workers can block indefinitely in io.ReadFull() with no per-stream re

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `>= 2026.4.5, < 2026.4.20` - Patched version: `2026.4.20` ## Impact A malicious workspace `.env` could set `MINIMAX_API_HOST` and redirect credentialed MiniMax requests to an attacker-controlled origin, exposing the MiniMax API key in the outbound `Authorization` header. This requires running OpenClaw from an atta

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact The QQBot direct-upload media path could forward attacker-controlled image URLs without applying the SSRF validation used by the local download path. This could make configured QQBot media delivery request or relay URLs the operator did not intend to allow. Th

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary Fiber cache middleware's default key generator uses only `c.Path()` and does not include the query string. As a result, requests like `/?id=1` and `/?id=2` can map to the same cache key and share the same cached response. This can cause response mix-up (cache poisoning-like behavior) for endpoints where response content depends on query parameters. ### Details Default configuration i

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary CoreDNS' tsig plugin can be bypassed on non-plain-DNS transports because it trusts the transport writer's TsigStatus() instead of performing verification itself. In the attached PoC, plain DNS/TCP correctly rejects an invalid TSIG (NOTAUTH), while the same invalid-TSIG request is accepted over DoT (tls://) and DoH (https://), allowing a client without the shared secret to satisfy requi

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary CoreDNS' transfer plugin can select the wrong ACL stanza when both a parent zone and a more-specific subzone are configured. A permissive parent-zone transfer rule can override a restrictive subzone rule (name-dependent), allowing an unauthorized client to perform AXFR/IXFR for the subzone and retrieve its zone contents. ### Details In plugin/transfer/transfer.go, stanza selection is

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary CoreDNS's DNS-over-HTTPS (DoH) GET path accepts oversized `dns=` query values and performs substantial request parsing, query unescaping, base64 decoding, and message unpacking work before returning `400 Bad Request`. A remote, unauthenticated attacker can repeatedly send oversized DoH GET requests to `/dns-query?dns=...` and force high CPU usage, large transient allocations, elevate

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary The gRPC, QUIC, DoH, and DoH3 transports in CoreDNS incorrectly handle TSIG authentication. For gRPC and QUIC, CoreDNS checks whether the TSIG key name exists in the config, but does not actually verify the TSIG HMAC. If the key name matches, `tsigStatus` remains nil and the tsig plugin treats the request as "verified". For DoH and DoH3, the issue is worse: TSIG is not verified at a

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary The HTML Writer in PhpSpreadsheet bypasses `htmlspecialchars()` output escaping when a cell uses a custom number format containing the `@` text placeholder with additional literal text (e.g., `@ "items"` or `"Total: "@`). This allows an attacker to inject arbitrary HTML and JavaScript into the generated HTML output by crafting a malicious XLSX file. ### Details #### 1. Conditional e

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

### Summary The Zipkin exporter remote endpoint cache accepted unbounded key growth derived from span attributes. In high-cardinality scenarios, this could increase process memory usage over time and degrade availability. ### Details - Introduce a bounded, thread-safe LRU cache for remote endpoints. - Enforce fixed maximum size to prevent unbounded growth. ### Impact - A process using Zipkin

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-29

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

It was discovered that there is a way to bypass HTML escaping in the HTML writer using custom number format codes. ## The Problem In `Writer/Html.php` around line 1592, the code checks if the formatted cell data equals the original data to decide whether to apply `htmlspecialchars()`: ```php if ($cellData === $origData) { $cellData = htmlspecialchars($cellData, ...); } ``` When a cell has

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
HIGH
ADVISORY 2026-04-28

No Title

推荐 19.4
Conf: 85%
GitHub Security Advisories

[MOCK] 这是一个厂商公告的伪摘要: No Title

💡 风险点: 涉及相关组件配置

🎯 建议动作: 建议排查资产和配置

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 厂商评估 High (+3) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 11.4
Conf: 50%
GitHub Security Advisories

### Impact The HTML output format in wlc embeds API response data into HTML without escaping, allowing cross-site scripting when the output is rendered in a browser. ### Patches * https://github.com/WeblateOrg/wlc/pull/1327 ### Workarounds The only vulnerable code path is HTML output which is opt-in. ### References Weblate thanks @fg0x0 for reporting this on GitHub.

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 影响关键基础设施/核心组件 (+4) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 9.4
Conf: 50%
GitHub Security Advisories

### Impact `@excalidraw/excalidraw@0.18.0` depends on a Mermaid conversion package version that resolves to a Mermaid release affected by CVE-2025-54881 / GHSA-7rqq-prvp-x9jh. User-supplied Mermaid sequence diagram labels could trigger XSS through Mermaid’s KaTeX label rendering path. This is patched in `@excalidraw/excalidraw@0.18.1` by updating `@excalidraw/mermaid-to-excalidraw` to `2.2.2`, w

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 9.4
Conf: 50%
GitHub Security Advisories

## Summary There is a timing side-channel vulnerability in Traefik's BasicAuth middleware that allows an attacker to enumerate valid usernames through response-time differences. The variable intended to hold a constant-time fallback secret always resolves to an empty string, causing the constant-time comparison to short-circuit in microseconds rather than performing a full bcrypt evaluation. Thi

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Impact _What kind of vulnerability is it? Who is impacted?_ **Command Injection vulnerabilities in electerm:** A command injection vulnerability exists in `github.com/elcterm/electerm/npm/install.js:130`. The `runLinux()` function appends attacker-controlled remote version strings directly into an `exec("rm -rf ...")` command without validation. **Who is impacted:** Users who run `npm insta

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

gitverify is still a prototype. ### Impact The bug is related to `requireSignedTags` which is on by default: an unsigned annotated tag would pass the verification. The commit pointed to by the tag would still have to be signed by a maintainer or a contributor. ### Patches Since the initial commit, fixed in c2c60da05d5c73621d0ce7ea02770bacd79ec8b1 (no semantic versions yet). ### Workarounds No

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary An unchecked type assertion in the `forEach` mutation handler allows any user with permission to create a `Policy` or `ClusterPolicy` to crash the cluster-wide background controller into a persistent CrashLoopBackOff. The same bug also causes the admission controller to drop connections and block all matching resource operations. The crash loop persists until the policy is deleted. Th

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### TL;DR This vulnerability affects all Kirby sites where users of a particular role have no permission to create pages, files or users (`pages.create`, `files.create` or `users.create` permission is disabled). This can be due to configuration in the user blueprint(s), via `options` in the model blueprint(s) or via a combination of both settings. **This vulnerability is of high severity for aff

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary Heimdall performs host matching in a case-sensitive manner, while HTTP hostnames are case-insensitive. This discrepancy can result in heimdall failing to match a rule for a request host that differs only in letter casing, potentially causing the request to be classified differently than intended. **Note:** The issue can only lead to unintended access if heimdall is configured with an

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
INFO
ADVISORY 2026-04-28

No Title

推荐 7.4
Conf: 50%
GitHub Security Advisories

### Summary Heimdall handles URL-encoded slashes (`%2F`) in a case-sensitive manner, while percent-encoding is defined to be case-insensitive. As a result, the lowercase equivalent (`%2f`) is not recognized and therefore not processed as expected when `allow_encoded_slashes` is set to `off` (the default setting). This discrepancy can lead to differences in how request paths are interpreted by he

💡 风险点: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 有可用补丁/修复方案 (+3) | Primary 数据源 (+3) | 官方一手公告 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)