Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
175 commits
Select commit Hold shift + click to select a range
7203f64
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
d6d6c97
Publish Advisories
advisory-database[bot] Feb 18, 2026
624ae4c
Publish Advisories
advisory-database[bot] Feb 18, 2026
0be8ae2
Improve GHSA-xfhx-r7ww-5995
maksim-m Feb 18, 2026
4ef3aa1
Publish Advisories
advisory-database[bot] Feb 18, 2026
0a0ba0f
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
a70887b
Merge pull request #6956 from github/maksim-m-GHSA-xfhx-r7ww-5995
advisory-database[bot] Feb 18, 2026
5c0e07c
Publish GHSA-xfhx-r7ww-5995
advisory-database[bot] Feb 18, 2026
2e5cf78
Publish GHSA-43fc-jf86-j433
advisory-database[bot] Feb 18, 2026
0bb5d2b
Publish Advisories
advisory-database[bot] Feb 18, 2026
0083c7c
Publish Advisories
advisory-database[bot] Feb 18, 2026
175bf9c
Publish GHSA-jfv4-h8mc-jcp8
advisory-database[bot] Feb 18, 2026
600a0a3
Publish Advisories
advisory-database[bot] Feb 18, 2026
51aad82
Publish GHSA-6xw9-2p64-7622
advisory-database[bot] Feb 18, 2026
5b7321c
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
67ec8ed
Advisory Database Sync
advisory-database[bot] Feb 18, 2026
c7b29b3
Publish Advisories
advisory-database[bot] Feb 18, 2026
c14bf0f
Publish Advisories
advisory-database[bot] Feb 18, 2026
2f7e08e
Publish GHSA-wx95-c6cv-8532
advisory-database[bot] Feb 18, 2026
41148b5
Publish Advisories
advisory-database[bot] Feb 18, 2026
b79537e
Publish Advisories
advisory-database[bot] Feb 18, 2026
81336c8
Publish Advisories
advisory-database[bot] Feb 18, 2026
799717c
Publish Advisories
advisory-database[bot] Feb 18, 2026
aa4d96d
Publish Advisories
advisory-database[bot] Feb 18, 2026
fe8107c
Publish Advisories
advisory-database[bot] Feb 18, 2026
44697e2
Publish Advisories
advisory-database[bot] Feb 18, 2026
f462145
Publish Advisories
advisory-database[bot] Feb 18, 2026
538d183
Publish Advisories
advisory-database[bot] Feb 18, 2026
32a17ae
Publish GHSA-pqqf-7hxm-rj5r
advisory-database[bot] Feb 18, 2026
089089d
Publish GHSA-2ww3-72rp-wpp4
advisory-database[bot] Feb 18, 2026
488a79e
Publish Advisories
advisory-database[bot] Feb 18, 2026
450add9
Publish Advisories
advisory-database[bot] Feb 18, 2026
0874b56
Publish Advisories
advisory-database[bot] Feb 18, 2026
76ad3dc
Publish Advisories
advisory-database[bot] Feb 18, 2026
9279da8
Publish Advisories
advisory-database[bot] Feb 18, 2026
6ea42f1
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
618fadc
Publish Advisories
advisory-database[bot] Feb 19, 2026
ead68b2
Publish Advisories
advisory-database[bot] Feb 19, 2026
465ccbb
Publish Advisories
advisory-database[bot] Feb 19, 2026
33f1945
Publish Advisories
advisory-database[bot] Feb 19, 2026
20d53d5
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
0de16c6
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
3b3e802
Publish GHSA-9f29-v6mm-pw6w
advisory-database[bot] Feb 19, 2026
78f91be
Publish Advisories
advisory-database[bot] Feb 19, 2026
58c895b
Publish Advisories
advisory-database[bot] Feb 19, 2026
2649f9d
Publish Advisories
advisory-database[bot] Feb 19, 2026
de9540d
Publish Advisories
advisory-database[bot] Feb 19, 2026
2869df6
Publish GHSA-gq3j-xvxp-8hrf
advisory-database[bot] Feb 19, 2026
56cbd5f
Publish Advisories
advisory-database[bot] Feb 19, 2026
cc944bc
Publish Advisories
advisory-database[bot] Feb 19, 2026
bbedc4f
Publish Advisories
advisory-database[bot] Feb 19, 2026
8290b32
Publish Advisories
advisory-database[bot] Feb 19, 2026
a57d901
Publish Advisories
advisory-database[bot] Feb 19, 2026
d1b99fb
Publish GHSA-67pg-wm7f-q7fj
advisory-database[bot] Feb 19, 2026
24430b5
Publish GHSA-2xcx-75h9-vr9h
advisory-database[bot] Feb 19, 2026
1ac0f74
Publish Advisories
advisory-database[bot] Feb 19, 2026
760bb6b
Publish Advisories
advisory-database[bot] Feb 19, 2026
8b065cc
Advisory Database Sync
advisory-database[bot] Feb 19, 2026
2f05351
Publish Advisories
advisory-database[bot] Feb 19, 2026
e5f2c22
Publish GHSA-fwxx-wv44-7qfg
advisory-database[bot] Feb 19, 2026
6b2fe29
Publish Advisories
advisory-database[bot] Feb 19, 2026
cc905f2
Publish Advisories
advisory-database[bot] Feb 19, 2026
38f4067
Publish Advisories
advisory-database[bot] Feb 19, 2026
ae16c8d
Publish Advisories
advisory-database[bot] Feb 19, 2026
fbdb304
Publish GHSA-pv58-549p-qh99
advisory-database[bot] Feb 19, 2026
2a4cc40
Advisory Database Sync
advisory-database[bot] Feb 20, 2026
03399a2
Publish Advisories
advisory-database[bot] Feb 20, 2026
8b38a69
Publish Advisories
advisory-database[bot] Feb 20, 2026
86b2861
Publish Advisories
advisory-database[bot] Feb 20, 2026
7b0594e
Publish Advisories
advisory-database[bot] Feb 20, 2026
f9e9f64
Publish Advisories
advisory-database[bot] Feb 20, 2026
e4ed87a
Publish Advisories
advisory-database[bot] Feb 20, 2026
da86798
Publish Advisories
advisory-database[bot] Feb 20, 2026
4f3178c
Publish Advisories
advisory-database[bot] Feb 20, 2026
f6494f1
Publish Advisories
advisory-database[bot] Feb 20, 2026
f0ae703
Publish Advisories
advisory-database[bot] Feb 20, 2026
9e37ed4
Publish GHSA-qqhf-pm3j-96g7
advisory-database[bot] Feb 20, 2026
6ecbb5d
Publish Advisories
advisory-database[bot] Feb 20, 2026
5c53a25
Publish Advisories
advisory-database[bot] Feb 20, 2026
2112e7a
Advisory Database Sync
advisory-database[bot] Feb 20, 2026
16b4db1
Publish GHSA-2ww3-72rp-wpp4
advisory-database[bot] Feb 20, 2026
1f80578
Publish Advisories
advisory-database[bot] Feb 20, 2026
4d1cb89
Publish Advisories
advisory-database[bot] Feb 20, 2026
c06dd00
Publish GHSA-2g4f-4pwh-qvx6
advisory-database[bot] Feb 20, 2026
abeec1b
Publish GHSA-wh94-p5m6-mr7j
advisory-database[bot] Feb 20, 2026
4892a03
Publish GHSA-r6h2-5gqq-v5v6
advisory-database[bot] Feb 20, 2026
ef3ccde
Publish GHSA-w45g-5746-x9fp
advisory-database[bot] Feb 20, 2026
caae1cc
Publish Advisories
advisory-database[bot] Feb 20, 2026
15ca792
Publish GHSA-378v-28hj-76wf
advisory-database[bot] Feb 20, 2026
f9abce7
Advisory Database Sync
advisory-database[bot] Feb 20, 2026
ebf4870
Publish GHSA-6qr9-g2xw-cw92
advisory-database[bot] Feb 20, 2026
3c5089d
Publish GHSA-8j8w-wwqc-x596
advisory-database[bot] Feb 20, 2026
d19ea1e
Publish GHSA-cxpw-2g23-2vgw
advisory-database[bot] Feb 20, 2026
a8170f7
Publish Advisories
advisory-database[bot] Feb 20, 2026
583028d
Publish Advisories
advisory-database[bot] Feb 20, 2026
7b171aa
Publish Advisories
advisory-database[bot] Feb 20, 2026
c0da40a
Advisory Database Sync
advisory-database[bot] Feb 21, 2026
4a25af6
Publish GHSA-gfw7-2v73-69wg
advisory-database[bot] Feb 21, 2026
715a73b
Publish Advisories
advisory-database[bot] Feb 21, 2026
1cb2f15
Publish Advisories
advisory-database[bot] Feb 21, 2026
b81a27c
Publish Advisories
advisory-database[bot] Feb 21, 2026
44095bd
Publish Advisories
advisory-database[bot] Feb 21, 2026
30c3276
Publish Advisories
advisory-database[bot] Feb 21, 2026
6fbb688
Publish Advisories
advisory-database[bot] Feb 21, 2026
493d991
Publish Advisories
advisory-database[bot] Feb 22, 2026
9632124
Publish Advisories
advisory-database[bot] Feb 22, 2026
1b8b37e
Publish Advisories
advisory-database[bot] Feb 22, 2026
5552854
Publish Advisories
advisory-database[bot] Feb 22, 2026
2ab36c6
Publish Advisories
advisory-database[bot] Feb 22, 2026
a53df6e
Publish Advisories
advisory-database[bot] Feb 22, 2026
90d3ff7
Publish Advisories
advisory-database[bot] Feb 22, 2026
241db5f
Publish Advisories
advisory-database[bot] Feb 22, 2026
03f1c80
Publish Advisories
advisory-database[bot] Feb 23, 2026
ace7bff
Publish Advisories
advisory-database[bot] Feb 23, 2026
395d01f
Advisory Database Sync
advisory-database[bot] Feb 23, 2026
a1043d8
Advisory Database Sync
advisory-database[bot] Feb 23, 2026
f58705f
Advisory Database Sync
advisory-database[bot] Feb 23, 2026
d56d988
Publish Advisories
advisory-database[bot] Feb 23, 2026
153075b
Advisory Database Sync
advisory-database[bot] Feb 23, 2026
8bd7c1f
Advisory Database Sync
advisory-database[bot] Feb 23, 2026
86cca5d
Publish GHSA-qq67-mvv5-fw3g
advisory-database[bot] Feb 23, 2026
e323cf2
Publish GHSA-w6x6-9fp7-fqm4
advisory-database[bot] Feb 23, 2026
ee45bba
Publish GHSA-299v-8pq9-5gjq
advisory-database[bot] Feb 23, 2026
131b189
Publish GHSA-xxh2-68g9-8jqr
advisory-database[bot] Feb 23, 2026
4088f0c
Publish Advisories
advisory-database[bot] Feb 23, 2026
819404a
Publish Advisories
advisory-database[bot] Feb 23, 2026
2f2f37a
Publish Advisories
advisory-database[bot] Feb 23, 2026
895a0c3
Publish Advisories
advisory-database[bot] Feb 23, 2026
c4a8d9a
Publish Advisories
advisory-database[bot] Feb 23, 2026
66ce563
Publish Advisories
advisory-database[bot] Feb 23, 2026
df24333
Publish Advisories
advisory-database[bot] Feb 23, 2026
bc90ce7
Publish Advisories
advisory-database[bot] Feb 23, 2026
661e2a1
Publish GHSA-r6v5-fh4h-64xc
advisory-database[bot] Feb 23, 2026
60eb5cc
Publish GHSA-mjjp-xjfg-97wg
advisory-database[bot] Feb 23, 2026
cdb3c51
Publish GHSA-2g4f-4pwh-qvx6
advisory-database[bot] Feb 23, 2026
25b7d8a
Publish GHSA-5mg8-w23w-74h3
advisory-database[bot] Feb 23, 2026
b6c5c52
Advisory Database Sync
advisory-database[bot] Feb 24, 2026
bb98158
Publish Advisories
advisory-database[bot] Feb 24, 2026
98d3857
Publish Advisories
advisory-database[bot] Feb 24, 2026
19beec9
Advisory Database Sync
advisory-database[bot] Feb 24, 2026
5e588eb
Publish Advisories
advisory-database[bot] Feb 24, 2026
8be3abb
Publish Advisories
advisory-database[bot] Feb 24, 2026
3431a55
Publish GHSA-378v-28hj-76wf
advisory-database[bot] Feb 24, 2026
5f6c60d
Publish Advisories
advisory-database[bot] Feb 24, 2026
c2b2e17
Advisory Database Sync
advisory-database[bot] Feb 24, 2026
0e621cd
Publish Advisories
advisory-database[bot] Feb 24, 2026
dc659ff
Publish Advisories
advisory-database[bot] Feb 24, 2026
b7b2bb8
Publish GHSA-p863-5fgm-rgq4
advisory-database[bot] Feb 24, 2026
4269a2c
Publish Advisories
advisory-database[bot] Feb 24, 2026
86d6e37
Publish GHSA-8jvj-p28h-9gm7
advisory-database[bot] Feb 24, 2026
eab2243
Publish Advisories
advisory-database[bot] Feb 24, 2026
86ebc0a
Publish Advisories
advisory-database[bot] Feb 24, 2026
9c0051a
Publish GHSA-v2gc-rm6g-wrw9
advisory-database[bot] Feb 24, 2026
dd1c7f0
Publish GHSA-v264-xqh4-9xmm
advisory-database[bot] Feb 24, 2026
f084940
Publish GHSA-9fww-8cpr-q66r
advisory-database[bot] Feb 24, 2026
3693a35
Publish GHSA-qrvq-68c2-7grw
advisory-database[bot] Feb 24, 2026
42fddb6
Publish Advisories
advisory-database[bot] Feb 24, 2026
e74e543
Publish Advisories
advisory-database[bot] Feb 24, 2026
1fedb7d
Publish GHSA-7c2f-r6gc-h92h
advisory-database[bot] Feb 24, 2026
05a6190
Publish GHSA-rcqw-6466-3mv7
advisory-database[bot] Feb 24, 2026
7ad146a
Advisory Database Sync
advisory-database[bot] Feb 24, 2026
2a5d7fa
Publish GHSA-78qv-3mpx-9cqq
advisory-database[bot] Feb 24, 2026
589d494
Publish GHSA-vxg3-v4p6-f3fp
advisory-database[bot] Feb 24, 2026
cb078b7
Publish GHSA-4894-xqv6-vrfq
advisory-database[bot] Feb 24, 2026
febc048
Publish GHSA-hhfx-5x8j-f5f6
advisory-database[bot] Feb 24, 2026
4919a84
Publish GHSA-m2cq-xjgm-f668
advisory-database[bot] Feb 24, 2026
680e8a1
Publish GHSA-4xrr-hq4w-6vf4
advisory-database[bot] Feb 24, 2026
7192969
Publish GHSA-hffm-g8v7-wrv7
advisory-database[bot] Feb 24, 2026
b073980
Publish GHSA-g7pc-pc7g-h8jh
advisory-database[bot] Feb 24, 2026
cd896d1
Publish GHSA-x76f-jf84-rqj8
advisory-database[bot] Feb 24, 2026
ef2887a
Publish GHSA-879p-475x-rqh2
advisory-database[bot] Feb 24, 2026
9dfe6dc
Publish GHSA-5r3v-vc8m-m96g
advisory-database[bot] Feb 24, 2026
cd5c203
Publish GHSA-xjhv-v822-pf94
advisory-database[bot] Feb 24, 2026
7c93389
Publish GHSA-852m-cvvp-9p4w
advisory-database[bot] Feb 24, 2026
0da6b32
Publish GHSA-m3c2-496v-cw3v
advisory-database[bot] Feb 24, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-hf23-9pf7-388p",
"modified": "2025-04-01T16:33:05Z",
"modified": "2026-02-24T15:32:32Z",
"published": "2019-07-26T16:09:47Z",
"aliases": [
"CVE-2019-10173"
Expand All @@ -25,17 +25,17 @@
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
"introduced": "1.4.10"
},
{
"fixed": "1.4.11"
}
]
}
],
"database_specific": {
"last_known_affected_version_range": "<= 1.4.10"
}
"versions": [
"1.4.10"
]
}
],
"references": [
Expand Down
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5mg8-w23w-74h3",
"modified": "2023-08-18T15:56:36Z",
"modified": "2026-02-23T22:45:53Z",
"published": "2021-03-25T17:04:19Z",
"aliases": [
"CVE-2020-8908"
],
"summary": "Information Disclosure in Guava",
"details": "A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.\n",
"details": "A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.",
"severity": [
{
"type": "CVSS_V3",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-8v38-pw62-9cw2",
"modified": "2025-12-20T03:15:43Z",
"modified": "2026-02-20T19:56:16Z",
"published": "2022-02-18T00:00:33Z",
"aliases": [
"CVE-2022-0639"
Expand All @@ -25,7 +25,7 @@
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
"introduced": "1.0.0"
},
{
"fixed": "1.5.7"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-rqff-837h-mm52",
"modified": "2022-02-24T14:00:06Z",
"modified": "2026-02-20T19:56:07Z",
"published": "2022-02-15T00:02:46Z",
"aliases": [
"CVE-2022-0512"
Expand All @@ -25,7 +25,7 @@
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
"introduced": "0.1.0"
},
{
"fixed": "1.5.6"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-gx7g-wjxg-jwwj",
"modified": "2022-04-18T22:17:42Z",
"modified": "2026-02-18T23:33:34Z",
"published": "2022-04-04T00:00:55Z",
"aliases": [
"CVE-2022-0088"
Expand Down Expand Up @@ -52,6 +52,10 @@
"type": "WEB",
"url": "https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59"
},
{
"type": "WEB",
"url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-0088.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/yourls/yourls"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-mg5h-rhjq-6v84",
"modified": "2022-11-01T20:35:47Z",
"modified": "2026-02-18T23:33:51Z",
"published": "2022-10-31T12:00:18Z",
"aliases": [
"CVE-2022-3766"
Expand Down Expand Up @@ -44,6 +44,10 @@
"type": "WEB",
"url": "https://github.com/thorsten/phpmyfaq/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d"
},
{
"type": "WEB",
"url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-3766.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/thorsten/phpmyfaq"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-cp9c-phxx-55xm",
"modified": "2022-12-12T22:08:01Z",
"modified": "2026-02-18T23:34:01Z",
"published": "2022-12-11T15:30:45Z",
"aliases": [
"CVE-2022-4407"
Expand Down Expand Up @@ -44,6 +44,10 @@
"type": "WEB",
"url": "https://github.com/thorsten/phpmyfaq/commit/1d73af34bf42764f9f9491c7ba5e9495d70e3ca5"
},
{
"type": "WEB",
"url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-4407.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/thorsten/phpmyfaq"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5pxr-7m4j-jjc6",
"modified": "2025-03-19T14:49:46Z",
"modified": "2026-02-18T23:46:36Z",
"published": "2024-06-07T19:37:10Z",
"aliases": [
"CVE-2024-37160"
],
"summary": "Cross-site scripting (XSS) vulnerability in Description metadata",
"details": "### Summary\nRegardless of the role or privileges, no user should be able to inject malicious JavaScript (JS) scripts into the body HTML. an XSS (Cross-Site Scripting) vulnerability, specifically a Stored XSS, which affects all pages of the website. Once the JS script is embedded in the body HTML, the XSS will trigger on any page a victim visits, such as the about, blog, contact, or any other pages, except for the panel.\n\n### Impact\nThis vulnerability allows attackers to inject malicious JS or HTML through a crafted payload into the vulnerable spot, achieving persistence and attacking numerous visitors or anyone accessing the website. The attack can be widespread and affect many users because the malicious JS will execute on every page, unlike an injection on a specific page (e.g., injecting on the About page would only affect that page). In this case, a single injection point leads to the execution of the malicious JS on all pages.\n\n### Patches\n- [**Formwork 1.13.1**](https://github.com/getformwork/formwork/releases/tag/1.13.1) has been released with a patch that solves this vulnerability by escaping all metadata attributes.\n- [**Formwork 2.x** (f531201)](https://github.com/getformwork/formwork/commit/f5312015a5a5e89b95ef2bd07e496f8474d579c5) also escapes metadata attributes.\n\n### Details\nAn attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard).\n\n### PoC\n1. Log in with an Administrator user account.\n2. Navigate to /panel/options/site/.\n3. Inject the JS script by adding to the description field.\n4. Simulate a victim who is not a site member visiting the website. You will notice that the JS script executes on every page they vis\n\n![image](https://github.com/getformwork/formwork/assets/170840940/1c40be24-3367-4c80-bb44-9db64ef88970)\n![image](https://github.com/getformwork/formwork/assets/170840940/68dd5bff-9db1-441b-a3b3-a0c014565f59)\n![image](https://github.com/getformwork/formwork/assets/170840940/3cd84c39-9b44-49d0-8b6a-6c8aeda7e49f)\n![image](https://github.com/getformwork/formwork/assets/170840940/f45afd87-80e9-4cf1-8121-bb4e121849c9)",
"details": "### Summary\nRegardless of the role or privileges, no user should be able to inject malicious JavaScript (JS) scripts into the body HTML. an XSS (Cross-Site Scripting) vulnerability, specifically a Stored XSS, which affects all pages of the website. Once the JS script is embedded in the body HTML, the XSS will trigger on any page a victim visits, such as the about, blog, contact, or any other pages, except for the panel.\n\n### Impact\nThis vulnerability allows attackers to inject malicious JS or HTML through a crafted payload into the vulnerable spot, achieving persistence and attacking numerous visitors or anyone accessing the website. The attack can be widespread and affect many users because the malicious JS will execute on every page, unlike an injection on a specific page (e.g., injecting on the About page would only affect that page). In this case, a single injection point leads to the execution of the malicious JS on all pages.\n\n### Patches\n- [**Formwork 1.13.1**](https://github.com/getformwork/formwork/releases/tag/1.13.1) has been released with a patch that solves this vulnerability by escaping all metadata attributes.\n- [**Formwork 2.x** (f531201)](https://github.com/getformwork/formwork/commit/f5312015a5a5e89b95ef2bd07e496f8474d579c5) also escapes metadata attributes.\n\n### Details\nAn attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard).",
"severity": [
{
"type": "CVSS_V3",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"schema_version": "1.4.0",
"id": "GHSA-c85w-x26q-ch87",
"modified": "2025-03-16T17:19:23Z",
"modified": "2026-02-18T23:47:37Z",
"published": "2025-03-01T00:11:52Z",
"aliases": [],
"summary": "Formwork improperly validates input of User role preventing site and panel availability",
"details": "### Summary\n\nImproper validation of select fields allows attackers to craft an input that crashes the system, resulting in a 500 status and making the entire site and administration panel unavailable.\nThis clearly impacts the Availability aspect of the CIA triad (confidentiality, integrity, and availability), although the attack still has certain limitations.\n\n### Details\n\nThe attack involves injecting any invalid user role value (e.g. \">\") into the Role=User parameter in the /panel/users/{name}/profile page, which is the user profile update page.\nDoing this will change the users data in a way that prevents users and then the entire site from loading. Even though the actual data change is minimal, the error is unrecoverable until a valid role parameter is restored by direct modification of the user account file.\nProper validation of select fields will prevent extraneous valid from being accepted and making the entire site and administration panel unavailable.\n\n### Patches\n- [**Formwork 2.x** (d9f0c1f)](https://github.com/getformwork/formwork/commit/d9f0c1feb3b9855d5bdc8bb189c0aaab2792e7ca) adds proper validation to select fields.\n\n### Impact\n\nThe condition for this attack is having high privileges or Admin access, which means it could be exploited by an Insider Threat. Alternatively, if an attacker gains access to a privileged user account, they can execute the attack as well.\nOverall, the attack is relatively difficult to carry out, but if successful, the impact and damage would be significant.\n\n### PoC\n\n![2025-02-27_10-25](https://github.com/user-attachments/assets/4b5a2d71-3397-4a5b-8464-35752376115a)\n\n1. Intercept the request and inject an input that will trigger an error.\n\n![2025-02-27_10-25_1](https://github.com/user-attachments/assets/a888c109-a724-4478-ae80-d9e8b05ef1aa)\n\n![image](https://github.com/user-attachments/assets/e81bb9fc-8c92-413c-8cc0-0bcffd2e2922)\n\n2.After that, it will be observed that the system is shut down or completely broken. Even changing the browser or resetting the server will not be able to restore it.",
"details": "### Summary\nImproper validation of select fields allows attackers to craft an input that crashes the system, resulting in a 500 status and making the entire site and administration panel unavailable.\nThis clearly impacts the Availability aspect of the CIA triad (confidentiality, integrity, and availability), although the attack still has certain limitations.\n\n### Details\nThe attack involves injecting any invalid user role value. Doing this will change the users data in a way that prevents users and then the entire site from loading. Even though the actual data change is minimal, the error is unrecoverable until a valid role parameter is restored by direct modification of the user account file.\nProper validation of select fields will prevent extraneous valid from being accepted and making the entire site and administration panel unavailable.\n\n### Patches\n- [**Formwork 2.x** (d9f0c1f)](https://github.com/getformwork/formwork/commit/d9f0c1feb3b9855d5bdc8bb189c0aaab2792e7ca) adds proper validation to select fields.\n\n### Impact\nThe condition for this attack is having high privileges or Admin access, which means it could be exploited by an Insider Threat. Alternatively, if an attacker gains access to a privileged user account, they can execute the attack as well.\nOverall, the attack is relatively difficult to carry out, but if successful, the impact and damage would be significant.",
"severity": [
{
"type": "CVSS_V3",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-j3wr-m6xh-64hg",
"modified": "2025-03-21T17:40:52Z",
"modified": "2026-02-24T16:08:07Z",
"published": "2025-03-20T12:32:43Z",
"aliases": [
"CVE-2024-12704"
Expand All @@ -18,7 +18,7 @@
{
"package": {
"ecosystem": "PyPI",
"name": "llama_index"
"name": "llama-index-core"
},
"ranges": [
{
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vf6x-59hh-332f",
"modified": "2025-03-17T20:27:03Z",
"modified": "2026-02-18T23:47:22Z",
"published": "2025-03-01T00:11:46Z",
"aliases": [],
"summary": " Formwork has a cross-site scripting (XSS) vulnerability in Site title",
"details": "### Summary\n\nThe site title field at /panel/options/site/allows embedding JS tags, which can be used to attack all members of the system. This is a widespread attack and can cause significant damage if there is a considerable number of users.\n\n### Impact\n\nThe attack is widespread, leveraging what XSS can do. This will undoubtedly impact system availability.\n\n### Patches\n- [**Formwork 2.x** (aa3e9c6)](https://github.com/getformwork/formwork/commit/aa3e9c684035d9e8495169fde7c57d97faa3f9a2) escapes site title from panel header navigation.\n\n### Details\n\nBy embedding \"<!--\", the source code can be rendered non-functional, significantly impacting system availability. However, the attacker would need admin privileges, making the attack more difficult to execute.\n\n### PoC\n\n![image](https://github.com/user-attachments/assets/8fc68f6f-8bc4-4b97-8b93-dee5b88a3fcf)\n\n1. The page where the vulnerability was found, and the attack surface is the Title field.\n![image](https://github.com/user-attachments/assets/dbf94354-7115-4d3b-81ba-6b6aff561b81)\n\n2. I tested accessing the Dashboard page using a regular user account with Firefox, a different browser, and found that it was also affected.\n![image](https://github.com/user-attachments/assets/0e72129a-7f2d-4f0e-b85e-0b1cedfd377e)\n\n3. Additionally, the remaining code was commented out to disrupt the UX/UI, making it difficult to revert the settings.",
"details": "### Summary\n\nThe site title field at /panel/options/site/allows embedding JS tags, which can be used to attack all members of the system. This is a widespread attack and can cause significant damage if there is a considerable number of users.\n\n### Impact\n\nThe attack is widespread, leveraging what XSS can do. This will undoubtedly impact system availability.\n\n### Patches\n- [**Formwork 2.x** (aa3e9c6)](https://github.com/getformwork/formwork/commit/aa3e9c684035d9e8495169fde7c57d97faa3f9a2) escapes site title from panel header navigation.\n\n### Details\n\nBy embedding \"<!--\", the source code can be rendered non-functional, significantly impacting system availability. However, the attacker would need admin privileges, making the attack more difficult to execute.",
"severity": [
{
"type": "CVSS_V3",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,11 @@
{
"schema_version": "1.4.0",
"id": "GHSA-pmc3-p9hx-jq96",
"modified": "2025-04-23T14:43:44Z",
"modified": "2026-02-20T16:51:12Z",
"published": "2025-04-23T14:43:44Z",
"aliases": [],
"aliases": [
"CVE-2026-26994"
],
"summary": "uTLS ServerHellos are accepted without checking TLS 1.3 downgrade canaries",
"details": "### Description\nBefore version 1.7.0, utls did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a utls ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a utls client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because utls did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint utls connections.\n\n### Fix Commit or Pull Request\n\nrefraction-networking/utls#337, specifically refraction-networking/utls@f8892761e2a4d29054264651d3a86fda83bc83f9\n\n### References\n\n- https://github.com/refraction-networking/utls/issues/181",
"severity": [
Expand Down Expand Up @@ -38,6 +40,10 @@
"type": "WEB",
"url": "https://github.com/refraction-networking/utls/security/advisories/GHSA-pmc3-p9hx-jq96"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26994"
},
{
"type": "WEB",
"url": "https://github.com/refraction-networking/utls/issues/181"
Expand All @@ -62,6 +68,6 @@
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2025-04-23T14:43:44Z",
"nvd_published_at": null
"nvd_published_at": "2026-02-20T03:16:01Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-8j8w-wwqc-x596",
"modified": "2025-12-22T18:41:25Z",
"modified": "2026-02-20T21:48:11Z",
"published": "2025-06-02T06:30:32Z",
"aliases": [
"CVE-2025-49113"
Expand Down Expand Up @@ -99,6 +99,10 @@
"type": "WEB",
"url": "https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-49113"
},
{
"type": "WEB",
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-49113-roundcube-mitigation-script"
Expand Down
Loading
Loading