Skip to content

Commit fdeb3dc

Browse files
chore: CVE advisories - 0 new, 1 updated
Automated update from NVD CVE feed. Keywords: Poll window: 2026-04-22T11:03:28Z to 2026-04-23T06:35:38.000Z
1 parent 448a2bd commit fdeb3dc

4 files changed

Lines changed: 6 additions & 4 deletions

File tree

advisories/feed.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"version": "0.0.3",
3-
"updated": "2026-04-22T11:03:28Z",
3+
"updated": "2026-04-23T06:36:30Z",
44
"description": "Community-driven security advisory feed for ClawSec. Automatically updated with OpenClaw-related CVEs from NVD and community-reported security incidents.",
55
"advisories": [
66
{
@@ -2643,6 +2643,7 @@
26432643
"title": "OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth f...",
26442644
"description": "OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.",
26452645
"affected": [
2646+
"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
26462647
"openclaw@*"
26472648
],
26482649
"platforms": [

advisories/feed.json.sig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
nfnw5kWhjTrEToNwCZNzXNq+umfKj2L9XLUXqVDzzU0ZLMZwvMLgHggT8nUny1UDIjkGlYrlrCXaf4aylM+ZAQ==
1+
oRsvP3icVWKR4TAM5YQVYgdrGn4Qd63rWrM1DEuc8w7UwVRpC7wO9nOv/jcFf2kMZzr9ylZrmkD51cOl3IfHAQ==

skills/clawsec-feed/advisories/feed.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"version": "0.0.3",
3-
"updated": "2026-04-22T11:03:28Z",
3+
"updated": "2026-04-23T06:36:30Z",
44
"description": "Community-driven security advisory feed for ClawSec. Automatically updated with OpenClaw-related CVEs from NVD and community-reported security incidents.",
55
"advisories": [
66
{
@@ -2643,6 +2643,7 @@
26432643
"title": "OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth f...",
26442644
"description": "OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption.",
26452645
"affected": [
2646+
"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
26462647
"openclaw@*"
26472648
],
26482649
"platforms": [
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
nfnw5kWhjTrEToNwCZNzXNq+umfKj2L9XLUXqVDzzU0ZLMZwvMLgHggT8nUny1UDIjkGlYrlrCXaf4aylM+ZAQ==
1+
oRsvP3icVWKR4TAM5YQVYgdrGn4Qd63rWrM1DEuc8w7UwVRpC7wO9nOv/jcFf2kMZzr9ylZrmkD51cOl3IfHAQ==

0 commit comments

Comments
 (0)