Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0045
published on
Permalink CVE-2026-23829
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Mailpit has SMTP Header Injection via Regex Bypass

Mailpit is an email testing tool and API for developers. Prior to version 1.28. Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue.

Affected products

mailpit
  • ==< 1.28.3

Matching in nixpkgs

pkgs.mailpit

Email and SMTP testing tool with API for developers

Package maintainers

Upstream advisory: https://github.com/axllent/mailpit/security/advisories/GHSA-54wq-72mp-cq7c
Upstream fix: https://github.com/axllent/mailpit/commit/36cc06c125954dec6673219dafa084e13cc14534
NIXPKGS-2026-0031
published on
Permalink CVE-2025-14017
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package wcurl
  • @LeSuisse removed package curlie
  • @LeSuisse removed package curlpp
  • @LeSuisse removed package phpExtensions.curl
  • @LeSuisse removed package curl-impersonate
  • @LeSuisse removed package curlWithGnuTls
  • @LeSuisse removed package curlMinimal
  • @LeSuisse removed package guile-curl
  • @LeSuisse removed package curlftpfs
  • @LeSuisse removed package curlHTTP3
  • @LeSuisse removed package grpcurl
  • @LeSuisse added package curlMinimal
  • @LeSuisse removed package curl-impersonate-ff
  • @LeSuisse removed package ocamlPackages.curly
  • @LeSuisse removed package ocamlPackages.ocurl
  • @LeSuisse removed package tclPackages.tclcurl
  • @LeSuisse removed package haskellPackages.curl
  • @LeSuisse removed package luaPackages.lua-curl
  • @LeSuisse removed package perlPackages.WWWCurl
  • @LeSuisse removed package php81Extensions.curl
  • @LeSuisse removed package php82Extensions.curl
  • @LeSuisse removed package php83Extensions.curl
  • @LeSuisse removed package haskellPackages.curlhs
  • @LeSuisse removed package php84Extensions.curl
  • @LeSuisse removed package lua51Packages.lua-curl
  • @LeSuisse removed package lua52Packages.lua-curl
  • @LeSuisse removed package lua53Packages.lua-curl
  • @LeSuisse removed package lua54Packages.lua-curl
  • @LeSuisse removed package curl-impersonate-chrome
  • @LeSuisse removed package luajitPackages.lua-curl
  • @LeSuisse removed package perl538Packages.WWWCurl
  • @LeSuisse removed package perl540Packages.WWWCurl
  • @LeSuisse removed package haskellPackages.hxt-curl
  • @LeSuisse removed package python312Packages.pycurl
  • @LeSuisse removed package python313Packages.pycurl
  • @LeSuisse removed package python312Packages.curlify
  • @LeSuisse removed package python313Packages.curlify
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages.libcurl
  • @LeSuisse removed package haskellPackages.recurly-client
  • @LeSuisse removed package haskellPackages.curly-expander
  • @LeSuisse removed package haskellPackages.curl-cookiejar
  • @LeSuisse removed package haskellPackages.download-curl
  • @LeSuisse removed package python313Packages.curl-cffi
  • @LeSuisse removed package python312Packages.curl-cffi
  • @LeSuisse removed package typstPackages.curli_0_1_0
  • @LeSuisse removed
    2 maintainers
    • @Scrumplex
    • @lovek323
  • @LeSuisse added
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse removed
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
broken TLS options for threaded LDAPS

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

Affected products

curl
  • =<7.19.5
  • =<7.44.0
  • =<7.84.0
  • =<7.19.7
  • =<7.43.0
  • =<7.65.1
  • =<7.29.0
  • =<8.13.0
  • =<8.9.0
  • =<7.23.1
  • =<7.23.0
  • =<7.21.6
  • =<8.7.1
  • =<7.21.2
  • =<7.83.0
  • =<7.85.0
  • =<8.6.0
  • =<7.49.1
  • =<7.28.1
  • =<8.0.0
  • =<7.66.0
  • =<7.64.1
  • =<7.64.0
  • =<7.39.0
  • =<7.69.0
  • =<8.4.0
  • =<7.18.1
  • =<7.35.0
  • =<7.19.6
  • =<7.21.7
  • =<8.1.2
  • =<7.25.0
  • =<7.22.0
  • =<7.53.1
  • =<8.17.0
  • =<7.76.1
  • =<7.76.0
  • =<7.21.0
  • =<7.77.0
  • =<7.55.1
  • =<7.40.0
  • =<7.19.2
  • =<8.2.0
  • =<7.48.0
  • =<7.45.0
  • =<7.80.0
  • =<8.11.0
  • =<7.82.0
  • =<7.88.1
  • =<7.24.0
  • =<7.78.0
  • =<7.83.1
  • =<8.7.0
  • =<7.31.0
  • =<7.52.1
  • =<7.54.1
  • =<8.12.0
  • =<7.46.0
  • =<7.32.0
  • =<7.56.0
  • =<7.47.0
  • =<7.62.0
  • =<8.10.0
  • =<7.52.0
  • =<8.2.1
  • =<7.74.0
  • =<7.37.0
  • =<7.41.0
  • =<7.20.0
  • =<7.81.0
  • =<7.50.1
  • =<7.21.5
  • =<7.72.0
  • =<7.61.1
  • =<7.30.0
  • =<7.65.3
  • =<7.47.1
  • =<7.37.1
  • =<7.65.2
  • =<7.50.2
  • =<7.60.0
  • =<7.88.0
  • =<7.28.0
  • =<7.18.0
  • =<7.36.0
  • =<7.20.1
  • =<7.61.0
  • =<7.21.1
  • =<8.1.1
  • =<7.42.0
  • =<7.19.0
  • =<7.73.0
  • =<7.56.1
  • =<7.69.1
  • =<7.21.3
  • =<7.65.0
  • =<7.19.3
  • =<7.50.0
  • =<7.50.3
  • =<8.11.1
  • =<7.67.0
  • =<7.17.0
  • =<7.79.1
  • =<7.58.0
  • =<7.26.0
  • =<7.17.1
  • =<7.70.0
  • =<8.3.0
  • =<8.12.1
  • =<7.79.0
  • =<7.55.0
  • =<8.15.0
  • =<7.71.0
  • =<7.87.0
  • =<7.53.0
  • =<7.33.0
  • =<7.18.2
  • =<7.75.0
  • =<7.19.1
  • =<8.9.1
  • =<8.14.0
  • =<8.1.0
  • =<7.51.0
  • =<7.19.4
  • =<7.21.4
  • =<8.16.0
  • =<7.49.0
  • =<7.86.0
  • =<7.68.0
  • =<7.59.0
  • =<8.10.1
  • =<8.5.0
  • =<7.71.1
  • =<8.14.1
  • =<7.27.0
  • =<8.8.0
  • =<7.57.0
  • =<7.54.0
  • =<8.0.1
  • =<7.38.0
  • =<7.34.0
  • =<7.63.0
  • =<7.42.1

Matching in nixpkgs

pkgs.curl

Command line tool for transferring files with URL syntax

pkgs.curlFull

Command line tool for transferring files with URL syntax

pkgs.curlMinimal

Command line tool for transferring files with URL syntax

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-0033
published on
Permalink CVE-2025-68675
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: proxy credentials for various providers might leak in task logs

In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue

Affected products

apache-airflow
  • <3.1.6

Matching in nixpkgs

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines

Package maintainers

Upstream advisory: https://lists.apache.org/thread/x6kply4nqd4vc4wgxtm6g9r2tt63s8c5
NIXPKGS-2026-0029
published on
Permalink CVE-2026-0990
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
  • @LeSuisse removed package perl540Packages.AlienLibxml2
  • @LeSuisse removed package perl538Packages.AlienLibxml2
  • @LeSuisse removed package python313Packages.libxml2
  • @LeSuisse removed package python312Packages.libxml2
  • @LeSuisse removed package perlPackages.AlienLibxml2
  • @LeSuisse removed package sbclPackages.cl-libxml2
  • @LeSuisse removed package libxml2Python
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.

References

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Upstream issue: https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1961208e958ca22f80a0b4e4c9d71cfa050aa982
NIXPKGS-2026-0043
published on
Permalink CVE-2025-62396
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: router (r.php) could expose application directories

An error-handling issue in the Moodle router (r.php) could cause the application to display internal directory listings when specific HTTP headers were not properly configured.

References

Affected products

moodle
  • <5.0.3
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0042
published on
Permalink CVE-2025-62398
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: possible to bypass mfa

A serious authentication flaw allowed attackers with valid credentials to bypass multi-factor authentication under certain conditions, potentially compromising user accounts.

References

Affected products

moodle
  • <4.4.11
  • <5.0.3
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0041
published on
Permalink CVE-2025-62399
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: password brute force risk when mobile/web services enabled

Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks.

References

Affected products

moodle
  • <4.4.11
  • <5.0.3
  • <4.1.21
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0040
published on
Permalink CVE-2025-62397
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed
    2 maintainers
    • @kmein
    • @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: router produces json instead of 404 error for invalid course id

The router’s inconsistent response to invalid course IDs allowed attackers to infer which course IDs exist, potentially aiding reconnaissance.

References

Affected products

moodle
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0039
published on
Permalink CVE-2025-62393
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: course access permissions not properly checked in course_output_fragment_course_overview

A flaw was found in the course overview output function where user access permissions were not fully enforced. This could allow unauthorized users to view information about courses they should not have access to, potentially exposing limited course details.

References

Affected products

moodle
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0038
published on
Permalink CVE-2025-62400
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed
    2 maintainers
    • @kmein
    • @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: hidden group names visible to event creators

Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information.

References

Affected products

moodle
  • <4.4.11
  • <5.0.3
  • <4.1.21
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)