Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1035
published on
Permalink CVE-2026-39863
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kamailio Core: TCP Data Processing Vulnerability

Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8.

Affected products

kamailio
  • ==>= 6.0.0, < 6.0.6
  • ==>= 6.1.0, < 6.1.1
  • ==< 5.8.8

Matching in nixpkgs

pkgs.kamailio

Fast and flexible SIP server, proxy, SBC, and load balancer

Package maintainers

NIXPKGS-2026-1034
published on
Permalink CVE-2026-39864
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kamailio Auth: Processing Vulnerability For Additional Authenticated User Identity Checks

Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7.

Affected products

kamailio
  • ==>= 6.0.0, < 6.0.5
  • ==< 5.8.7

Matching in nixpkgs

pkgs.kamailio

Fast and flexible SIP server, proxy, SBC, and load balancer

Package maintainers

NIXPKGS-2026-1033
published on
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has incorrect access control in getting_started_controller

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4.

Affected products

zammad
  • ==< 6.5.4
  • ==>= 7.0.0-alpha, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1032
published on
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has an information disclosure in ticket detail view of customers in shared organizations

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, customers in shared organizations (means they can see each other's tickets) could see fields which are not intended for customers - including fields not intended for them at all (e.g. priority, custom ticket attributes for internal purposes). This was the case when a customer opened a ticket from another user of the same shared organization. They are not able to modify these field. This vulnerability is fixed in 7.0.1.

Affected products

zammad
  • ==>= 7.0.0, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1031
published on
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad is missing authorization in ticket create endpoint

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the used endpoint for ticket creation was missing authorization if the related parameter for adding links is used. This vulnerability is fixed in 7.0.1 and 6.5.4.

Affected products

zammad
  • ==< 6.5.4
  • ==>= 7.0.0-alpha, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1030
published on
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has a server-side template injection leading to RCE via AI Agent

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vulnerability which leads to RCE via AI Agent exists. Impact is limited to environments where an attacker can control or influence type_enrichment_data (typically high-privilege administrative configuration). This vulnerability is fixed in 7.0.1.

Affected products

zammad
  • ==>= 7.0.0, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1029
published on
updated 20 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has Cross-site request forgery (CSRF) in OAuth callback endpoints

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the OAuth callback endpoints for Microsoft, Google, and Facebook external credentials do not validate a CSRF state parameter. This vulnerability is fixed in 7.0.1 and 6.5.4.

Affected products

zammad
  • ==< 6.5.4
  • ==>= 7.0.0-alpha, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1028
published on
Permalink CVE-2026-40026
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 21 minutes ago by @LeSuisse Activity log
Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read

The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the ISO9660 filesystem parser where the parse_susp() function trusts len_id, len_des, and len_src fields from the disk image to memcpy data into a stack buffer without verifying that the source data falls within the parsed SUSP block. An attacker can craft a malicious ISO image that causes reads past the end of the SUSP data buffer, and a zero-length SUSP entry can trigger an infinite parsing loop.

Affected products

sleuthkit
  • ==a95b0ac21733b059a517aaefa667a17e1bcbdee1
  • =<4.14.0

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1027
published on
Permalink CVE-2026-39844
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 21 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
  • @LeSuisse removed package python312Packages.nicegui-highcharts
  • @LeSuisse removed package python313Packages.nicegui-highcharts
  • @LeSuisse removed package python314Packages.nicegui-highcharts
NiceGUI has a Path Traversal in NiceGUI Upload Filename on Windows via Backslash Bypass of PurePosixPath Sanitization

NiceGUI is a Python-based UI framework. Prior to 3.10.0, Since PurePosixPath only recognizes forward slashes (/) as path separators, an attacker can bypass this sanitization on Windows by using backslashes (\) in the upload filename. Applications that construct file paths using file.name (a pattern demonstrated in NiceGUI's bundled examples) are vulnerable to arbitrary file write on Windows. This vulnerability is fixed in 3.10.0.

Affected products

nicegui
  • ==< 3.10.0

Matching in nixpkgs

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1025
published on
updated 21 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad is miissing authorization in AI assistance controller for context data used in text tools

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, he REST endpoint POST /api/v1/ai_assistance/text_tools/:id contains an authorization failure. Context data (e.g., a group or organization) supplied to be used in the AI prompt were not checked if they are accessible for the current user. This leads to having data present in the AI prompt that were not authorized before being used. A user needs to have ticket.agent permission to be able to use the provided context data. This vulnerability is fixed in 7.0.1.

Affected products

zammad
  • ==>= 7.0.0, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers