No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dragonmonk111
Dragonmonk111 junoclaw |
|
| Vendors & Products |
Dragonmonk111
Dragonmonk111 junoclaw |
Tue, 12 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. This vulnerability is fixed in 0.x.y-security-1. | |
| Title | JunoClaw: SSRF in WAVS computeDataVerify allows cloud-metadata and internal-service access | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:35:30.160Z
Reserved: 2026-05-04T20:24:31.917Z
Link: CVE-2026-43993
Updated: 2026-05-13T14:35:24.614Z
Status : Deferred
Published: 2026-05-12T17:16:21.380
Modified: 2026-05-13T17:00:37.097
Link: CVE-2026-43993
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:38:37Z