-
Notifications
You must be signed in to change notification settings - Fork 585
Expand file tree
/
Copy pathGHSA-4hmj-39m8-jwc7.json
More file actions
73 lines (73 loc) · 2.46 KB
/
GHSA-4hmj-39m8-jwc7.json
File metadata and controls
73 lines (73 loc) · 2.46 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
{
"schema_version": "1.4.0",
"id": "GHSA-4hmj-39m8-jwc7",
"modified": "2026-04-10T19:44:43Z",
"published": "2026-03-29T15:50:41Z",
"aliases": [
"CVE-2026-35651"
],
"summary": "OpenClaw has ACP CLI approval prompt ANSI escape sequence injection",
"details": "## Summary\n\nACP CLI approval prompt ANSI escape sequence injection\n\n## Affected Packages / Versions\n\n- Package: `openclaw`\n- Affected versions: `>= 2026.2.13, <= 2026.3.24`\n- First patched version: `2026.3.25`\n- Latest published npm version at verification time: `2026.3.24`\n\n## Details\n\nACP tool titles could previously carry ANSI control sequences into approval prompts and permission logs, letting untrusted tool metadata spoof terminal output. Commit `464e2c10a5edceb380d815adb6ff56e1a4c50f60` sanitizes tool titles at the source and broadens ANSI stripping to full CSI sequences.\n\nVerified vulnerable on tag `v2026.3.24` and fixed on `main` by commit `464e2c10a5edceb380d815adb6ff56e1a4c50f60`.\n\n## Fix Commit(s)\n\n- `464e2c10a5edceb380d815adb6ff56e1a4c50f60`",
"severity": [
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
}
],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2026.2.13"
},
{
"fixed": "2026.3.28"
}
]
}
],
"database_specific": {
"last_known_affected_version_range": "<= 2026.3.24"
}
}
],
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4hmj-39m8-jwc7"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35651"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/464e2c10a5edceb380d815adb6ff56e1a4c50f60"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-ansi-escape-sequence-injection-in-approval-prompt"
}
],
"database_specific": {
"cwe_ids": [
"CWE-116",
"CWE-150"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2026-03-29T15:50:41Z",
"nvd_published_at": "2026-04-10T17:17:05Z"
}
}