Skip to content

Commit 47d95d3

Browse files
1 parent f15232f commit 47d95d3

2 files changed

Lines changed: 66 additions & 15 deletions

File tree

advisories/unreviewed/2026/03/GHSA-6fmv-xxpf-w3cw/GHSA-6fmv-xxpf-w3cw.json renamed to advisories/github-reviewed/2026/03/GHSA-6fmv-xxpf-w3cw/GHSA-6fmv-xxpf-w3cw.json

Lines changed: 40 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,38 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6fmv-xxpf-w3cw",
4-
"modified": "2026-03-25T18:31:55Z",
4+
"modified": "2026-03-27T19:40:25Z",
55
"published": "2026-03-25T18:31:55Z",
66
"aliases": [
77
"CVE-2025-67030"
88
],
9+
"summary": "Plexus-Utils has a Directory Traversal vulnerability in its extractFile method ",
910
"details": "Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code",
1011
"severity": [],
11-
"affected": [],
12+
"affected": [
13+
{
14+
"package": {
15+
"ecosystem": "Maven",
16+
"name": "org.codehaus.plexus:plexus-utils"
17+
},
18+
"ranges": [
19+
{
20+
"type": "ECOSYSTEM",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "4.0.3"
27+
}
28+
]
29+
}
30+
],
31+
"database_specific": {
32+
"last_known_affected_version_range": "<= 4.0.2"
33+
}
34+
}
35+
],
1236
"references": [
1337
{
1438
"type": "ADVISORY",
@@ -33,13 +57,23 @@
3357
{
3458
"type": "WEB",
3559
"url": "https://gist.github.com/weaver4VD/3216dac645220f8c9b488362f61241ec"
60+
},
61+
{
62+
"type": "PACKAGE",
63+
"url": "https://github.com/codehaus-plexus/plexus-utils"
64+
},
65+
{
66+
"type": "WEB",
67+
"url": "https://github.com/codehaus-plexus/plexus-utils/releases/tag/plexus-utils-4.0.3"
3668
}
3769
],
3870
"database_specific": {
39-
"cwe_ids": [],
40-
"severity": null,
41-
"github_reviewed": false,
42-
"github_reviewed_at": null,
71+
"cwe_ids": [
72+
"CWE-22"
73+
],
74+
"severity": "HIGH",
75+
"github_reviewed": true,
76+
"github_reviewed_at": "2026-03-27T19:40:25Z",
4377
"nvd_published_at": "2026-03-25T18:16:25Z"
4478
}
4579
}

advisories/unreviewed/2026/03/GHSA-8j44-735h-w4w2/GHSA-8j44-735h-w4w2.json renamed to advisories/github-reviewed/2026/03/GHSA-8j44-735h-w4w2/GHSA-8j44-735h-w4w2.json

Lines changed: 26 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,47 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8j44-735h-w4w2",
4-
"modified": "2026-03-25T18:31:47Z",
4+
"modified": "2026-03-27T19:38:38Z",
55
"published": "2026-03-25T18:31:47Z",
66
"aliases": [
77
"CVE-2026-26832"
88
],
9+
"summary": "node-tesseract-ocr is vulnerable to OS Command Injection through unsanitized recognize() function parameter",
910
"details": "node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a shell command string and passed to child_process.exec() without proper sanitization",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "node-tesseract-ocr"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.2.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26832"
2142
},
2243
{
23-
"type": "WEB",
44+
"type": "PACKAGE",
2445
"url": "https://github.com/zapolnoch/node-tesseract-ocr"
2546
},
2647
{
@@ -30,19 +51,15 @@
3051
{
3152
"type": "WEB",
3253
"url": "https://github.com/zebbernCVE/CVE-2026-26832"
33-
},
34-
{
35-
"type": "WEB",
36-
"url": "https://www.npmjs.com/package/node-tesseract-ocr"
3754
}
3855
],
3956
"database_specific": {
4057
"cwe_ids": [
4158
"CWE-78"
4259
],
4360
"severity": "CRITICAL",
44-
"github_reviewed": false,
45-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-03-27T19:38:38Z",
4663
"nvd_published_at": "2026-03-25T16:16:21Z"
4764
}
4865
}

0 commit comments

Comments
 (0)