Published issues
Permalink
CVE-2026-34242
7.7 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python314Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-schemas
- python313Packages.weblate-schemas
- python312Packages.weblate-schemas
- python314Packages.weblate-fonts
- python312Packages.weblate-language-data
- python313Packages.weblate-fonts
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: Arbitrary File Read via Symlink
Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-24126
6.6 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): LOW
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 months, 1 week ago
-
@LeSuisse
ignored
6 packages
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate has an argument injection in management console
Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not validate the passed input while adding the SSH host key, which could lead to an argument injection to `ssh-add`. Version 5.16.0 fixes the issue. As a workaround, properly limit access to the management console.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (6)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-39845
4.1 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python314Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-schemas
- python313Packages.weblate-schemas
- python312Packages.weblate-schemas
- python314Packages.weblate-fonts
- python313Packages.weblate-fonts
- python312Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: SSRF via the webhook add-on using unprotected fetch_url()
Weblate is a web based localization tool. In versions prior to 5.17, the webhook add-on did not utilize existing SSRF protections. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable the webhook add-on as a workaround.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Apache Airflow: RCE by race condition in example_xcom dag
The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value
from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary
execution of code on the worker. Since the UI users are already highly trusted, this is a Low severity vulnerability.
It does not affect Airflow release - example_dags are not supposed to be enabled in production environment, however
users following the example could replicate the bad pattern. Documentation of Airflow 3.2.0 contains version of
the example with improved resiliance for that case.
Users who followed that pattern are advised to adjust their implementations accordingly.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
Permalink
CVE-2026-40193
8.2 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
package libmaddy-markdown
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Maddy Mail Server: LDAP Filter Injection via Unsanitized Username
maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames are interpolated into LDAP search filters and DN strings via strings.ReplaceAll() without any LDAP filter escaping, despite the go-ldap/ldap/v3 library's ldap.EscapeFilter() function being available in the same import. This affects three code paths: the Lookup() filter, the AuthPlain() DN template, and the AuthPlain() filter. An attacker with network access to the SMTP submission or IMAP interface can inject arbitrary LDAP filter expressions through the username field in AUTH PLAIN or LOGIN commands. This enables identity spoofing by manipulating filter results to authenticate as another user, LDAP directory enumeration via wildcard filters, and blind extraction of LDAP attribute values using authentication responses as a boolean oracle or via timing side-channels between the two distinct failure paths. This issue has been fixed in version 0.9.3.
Matching in nixpkgs
Composable all-in-one mail server
-
-
-
nixos-25.11-small
0.8.2
-
nixpkgs-25.11-darwin
0.8.2
Ignored packages (1)
C++ Markdown to HTML header-only parser library
-
-
-
nixos-25.11-small
1.6.0
-
nixpkgs-25.11-darwin
1.6.0
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
17 packages
- python312Packages.pillow-heif
- python312Packages.pillow-jpls
- python312Packages.pillowfight
- python313Packages.pillow-heif
- python313Packages.pillow-jpls
- python313Packages.pillowfight
- python314Packages.pillow-heif
- python314Packages.pillow-jpls
- python314Packages.pillowfight
- python312Packages.types-pillow
- python313Packages.types-pillow
- python314Packages.types-pillow
- python312Packages.pypillowfight
- python313Packages.pypillowfight
- python314Packages.pypillowfight
- python312Packages.pillow-avif-plugin
- python313Packages.pillow-avif-plugin
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
ignored
maintainer @mweinelt
1 week, 6 days ago
maintainer.ignore
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Pillow is vulnerable to a FITS GZIP decompression bomb
Pillow is a Python imaging library. Versions 10.3.0 through 12.1.1 did not limit the amount of GZIP-compressed data read when decoding a FITS image, making them vulnerable to decompression bomb attacks. A specially crafted FITS file could cause unbounded memory consumption, leading to denial of service (OOM crash or severe performance degradation). If users are unable to immediately upgrade, they should only open specific image formats, excluding FITS, as a workaround.
Matching in nixpkgs
Friendly PIL fork (Python Imaging Library)
Friendly PIL fork (Python Imaging Library)
Friendly PIL fork (Python Imaging Library)
Ignored packages (17)
Python library for working with HEIF images and plugin for Pillow
-
-
nixos-25.11-small
1.1.0
-
nixpkgs-25.11-darwin
1.1.0
JPEG-LS plugin for the Python Pillow library
-
-
nixos-25.11-small
1.3.2
-
nixpkgs-25.11-darwin
1.3.2
Eases the transition from PIL to Pillow for Python packages
-
-
nixos-25.11-small
0.4
-
nixpkgs-25.11-darwin
0.4
Python library for working with HEIF images and plugin for Pillow
-
-
-
nixos-25.11-small
1.1.0
-
nixpkgs-25.11-darwin
1.1.0
JPEG-LS plugin for the Python Pillow library
-
-
-
nixos-25.11-small
1.3.2
-
nixpkgs-25.11-darwin
1.3.2
Eases the transition from PIL to Pillow for Python packages
-
-
nixpkgs-unstable
0.4
-
nixos-unstable-small
0.4
-
-
nixos-25.11-small
0.4
-
nixpkgs-25.11-darwin
0.4
Python library for working with HEIF images and plugin for Pillow
JPEG-LS plugin for the Python Pillow library
Eases the transition from PIL to Pillow for Python packages
-
-
nixpkgs-unstable
0.4
-
nixos-unstable-small
0.4
Library containing various image processing algorithms
-
-
nixos-25.11-small
0.3.1
-
nixpkgs-25.11-darwin
0.3.1
Library containing various image processing algorithms
-
-
-
nixos-25.11-small
0.3.1
-
nixpkgs-25.11-darwin
0.3.1
Library containing various image processing algorithms
Pillow plugin that adds support for AVIF files
-
-
nixos-25.11-small
1.5.2
-
nixpkgs-25.11-darwin
1.5.2
Pillow plugin that adds support for AVIF files
-
-
nixos-25.11-small
1.5.2
-
nixpkgs-25.11-darwin
1.5.2
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-40091
6.0 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
3 packages
- tree-sitter-grammars.tree-sitter-spicedb
- python314Packages.tree-sitter-grammars.tree-sitter-spicedb
- python313Packages.tree-sitter-grammars.tree-sitter-spicedb
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
SpiceDB: SPICEDB_DATASTORE_CONN_URI is leaked on startup logs
SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions 1.49.0 through 1.51.0, when SpiceDB starts with log level info, the startup "configuration" log will include the full datastore DSN, including the plaintext password, inside DatastoreConfig.URI. This issue has been fixed in version 1.51.1. If users are unable to immediately upgrade, they can work around this issue by changing the log level to warn or error.
Matching in nixpkgs
Open source permission database
Ignored packages (3)
Tree-sitter grammar for spicedb
Python bindings for tree-sitter-spicedb
Python bindings for tree-sitter-spicedb
Permalink
CVE-2026-40173
9.4 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): LOW
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
5 packages
- coqPackages.dpdgraph
- perlPackages.GDGraph
- perl5Packages.GDGraph
- perl538Packages.GDGraph
- perl540Packages.GDGraph
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Dgraph: Unauthenticated pprof endpoint leaks admin auth token
Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authentication, exposing the full process command line including the admin token configured via the --security "token=..." startup flag. An attacker can retrieve the leaked token and reuse it in the X-Dgraph-AuthToken header to gain unauthorized access to admin-only endpoints such as /admin/config/cache_mb, bypassing the adminAuthHandler token validation. This enables unauthorized privileged administrative access including configuration changes and operational control actions in any deployment where the Alpha HTTP port is reachable by untrusted parties. This issue has been fixed in version 25.3.2.
Matching in nixpkgs
Fast, Distributed Graph DB
Ignored packages (5)
Build dependency graphs between Coq objects
Graph Plotting Module for Perl 5
-
-
nixpkgs-unstable
1.56
-
nixos-unstable-small
1.56
-
-
nixos-25.11-small
1.56
-
nixpkgs-25.11-darwin
1.56
Graph Plotting Module for Perl 5
-
-
nixpkgs-unstable
1.56
-
nixos-unstable-small
1.56
Graph Plotting Module for Perl 5
-
-
nixos-25.11-small
1.56
-
nixpkgs-25.11-darwin
1.56
Graph Plotting Module for Perl 5
-
-
nixos-25.11-small
1.56
-
nixpkgs-25.11-darwin
1.56
Permalink
CVE-2026-25219
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Apache Airflow: Sensitive Azure Service Bus connection string (and possibly other providers) exposed to users with view access
The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidentaly logged to logs, those values could be seen in the logs. Azure Service Bus used those properties to store sensitive values. Possibly other providers could be also affected if they used the same fields to store sensitive data.
If you used Azure Service Bus connection with those values set or if you have other connections with those values storing sensitve values, you should upgrade Airflow to 3.1.8
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
radare2 < 6.1.4 Command Injection via PDB Parser print_gvars()
radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by embedding a newline byte in the PE section header name field. Attackers can craft a malicious PDB file with specially crafted section names to inject r2 commands that are executed when the idp command processes the file.
Affected products
radare2
-
==5590c87deeb7eb2a106fd7aab9ca88bfeebb7397
-
<6.1.4
Matching in nixpkgs
UNIX-like reverse engineering framework and command-line toolset
-
-
-
nixos-25.11-small
6.1.2
-
nixpkgs-25.11-darwin
6.1.2