GHSA-f3h5-h452-vp3j.yaml
1 info: 2 name: OpenClaw 3 cve: GHSA-f3h5-h452-vp3j 4 summary: OpenClaw Nostr profile mutation routes allowed operator.write config persistence 5 details: "Summary\r\n\r\nNostr profile mutation routes allowed operator.write config persistence.\r\n\r\nAffected Packages\ 6 \ / Versions\r\n\r\n- Package: openclaw\r\n- Ecosystem: npm\r\n- Affected versions: < 2026.4.10\r\n- Patched versions:\ 7 \ >= 2026.4.10\r\n\r\nImpact\r\n\r\nNostr plugin HTTP profile routes could persist profile config through a path that\ 8 \ did not require admin authority.\r\n\r\nTechnical Details\r\n\r\nThe fix requires operator.admin scope for Nostr profile\ 9 \ mutation routes.\r\n\r\nFix\r\n\r\nThe issue was fixed in 63553. The first stable tag containing the fix is v2026.4.10,\ 10 \ and openclaw@2026.4.14 includes the fix.\r\n\r\n\nCredits\r\n\r\nThanks to @zpbrent and @zsxsoft, with sponsorship from\ 11 \ @KeenSecurityLab and @qclawer for reporting this issue." 12 cvss: '' 13 severity: MEDIUM 14 security_advise: 'Upgrade openclaw to >= 2026.4.10 or later. The issue was fixed in #63553. The first stable tag containing 15 the fix is v2026.4.10, and openclaw@2026.4.14 includes the fix.' 16 references: 17 - https://github.com/openclaw/openclaw/security/advisories/GHSA-f3h5-h452-vp3j 18 rule: version < "2026.4.10" 19 references: 20 - https://github.com/openclaw/openclaw/security/advisories/GHSA-f3h5-h452-vp3j