[Git][security-tracker-team/security-tracker][master] auto-nfu: Add rule for OpenClaw
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Mar 6 08:34:45 GMT 2026
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c5fb4032 by Moritz Muehlenhoff at 2026-03-06T09:34:14+01:00
auto-nfu: Add rule for OpenClaw
- - - - -
2 changed files:
- data/CVE/list
- data/packages/nfu.yaml
Changes:
=====================================
data/CVE/list
=====================================
@@ -21,17 +21,17 @@ CVE-2026-2331 (An attacker may perform unauthenticated read and write operations
CVE-2026-2330 (An attacker may access restricted filesystem areas on the device via t ...)
NOT-FOR-US: SICK AG
CVE-2026-29613 (OpenClaw versions prior to 2026.2.12 contain a vulnerability in the Bl ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29612 (OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29611 (OpenClaw versions prior to 2026.2.14 contain a local file inclusion vu ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29610 (OpenClaw versions prior to 2026.2.14 contain a command hijacking vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29609 (OpenClaw versions prior to 2026.2.14 contain a denial of service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29606 (OpenClaw versions prior to 2026.2.14 contain a webhook signature-verif ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-29188 (File Browser provides a file managing interface within a specified dir ...)
TODO: check
CVE-2026-29183 (SiYuan is a personal knowledge management system. Prior to version 3.5 ...)
@@ -165,77 +165,77 @@ CVE-2026-28497 (TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win3
CVE-2026-28492 (File Browser provides a file managing interface within a specified dir ...)
TODO: check
CVE-2026-28486 (OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traver ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28485 (OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandator ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28484 (OpenClaw versions prior to 2026.2.15 contain an option injection vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28482 (OpenClaw versions prior to 2026.2.12 construct transcript file paths u ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28481 (OpenClaw versions 2026.1.30 and earlier, contain an information disclo ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28480 (OpenClaw versions prior to 2026.2.14 contain an authorization bypass v ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28479 (OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identif ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28478 (OpenClaw versions prior to 2026.2.13 contain a denial of service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28477 (OpenClaw versions prior to 2026.2.14 contain an oauth state validation ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28476 (OpenClaw versions prior to 2026.2.14 contain a server-side request for ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28475 (OpenClaw versions prior to 2026.2.13 use non-constant-time string comp ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28474 (OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equ ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28473 (OpenClaw versions prior to 2026.2.2 contain an authorization bypass vu ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28472 (OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gat ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28471 (OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28470 (OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28469 (OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnera ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28468 (OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulner ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28467 (OpenClaw versions prior to 2026.2.2 contain a server-side request forg ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28466 (OpenClaw versions prior to 2026.2.14 contain a vulnerability in the ga ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28465 (OpenClaw's voice-call plugin versions before 2026.2.3 contain an impro ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28464 (OpenClaw versions prior to 2026.2.12 use non-constant-time string comp ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28463 (OpenClaw exec-approvals allowlist validation checks pre-expansion argv ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28462 (OpenClaw versions prior to 2026.2.13 contain a vulnerability in the br ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28459 (OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28458 (OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28457 (OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerab ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28456 (OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28454 (OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets i ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28453 (OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entr ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28452 (OpenClaw versions prior to 2026.2.14 contain a denial of service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28451 (OpenClaw versions prior to 2026.2.14 contain server-side request forge ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28450 (OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin en ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28448 (OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28447 (OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path tr ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28446 (OpenClaw versions prior to 2026.2.1 with the voice-call extension inst ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28443 (OpenReplay is a self-hosted session replay suite. Prior to version 1.2 ...)
TODO: check
CVE-2026-28442 (ZimaOS is a fork of CasaOS, an operating system for Zima devices and x ...)
@@ -255,15 +255,15 @@ CVE-2026-28410 (The Graph is an indexing protocol for querying networks like Eth
CVE-2026-28405 (MarkUs is a web application for the submission and grading of student ...)
TODO: check
CVE-2026-28395 (OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper ne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28394 (OpenClaw versions prior to 2026.2.15 contain a denial of service vulne ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28393 (OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traver ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28392 (OpenClaw versions prior to 2026.2.14 contain a privilege escalation vu ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-28391 (OpenClaw versions prior to 2026.2.2 fail to properly validate Windows ...)
- TODO: check
+ NOT-FOR-US: OpenClaw
CVE-2026-27807 (MarkUs is a web application for the submission and grading of student ...)
TODO: check
CVE-2026-27778 (The WebSocket Application Programming Interface lacks restrictions on ...)
=====================================
data/packages/nfu.yaml
=====================================
@@ -757,6 +757,8 @@
description: '.*\b(?i:Linksys)\b.*'
- reason: MyBB
description: '.*\bMyBB\b.*'
+- reason: OpenClaw
+ description: '.*\bOpenClaw\b.*'
- reason: OpenEMR
description: '.*\bOpenEMR\b.*'
- reason: PCMan FTP Server
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5fb40324ee6f0b693d06d29ab8d47b820ea74c0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5fb40324ee6f0b693d06d29ab8d47b820ea74c0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260306/64f34273/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list