Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0094
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • python312Packages.wagtail-localize
    • python313Packages.wagtail-localize
    • python314Packages.wagtail-localize
    • python312Packages.wagtail-factories
    • python313Packages.wagtail-factories
    • python314Packages.wagtail-factories
    • python312Packages.wagtail-modeladmin
    • python313Packages.wagtail-modeladmin
    • python314Packages.wagtail-modeladmin
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Wagtail has improper permission handling on admin preview endpoints

Wagtail is an open source content management system built on Django. Prior to versions 6.3.6, 7.0.4, 7.1.3, 7.2.2, and 7.3, due to a missing permission check on the preview endpoints, a user with access to the Wagtail admin and knowledge of a model's fields can craft a form submission to obtain a preview rendering of any page, snippet or site setting object for which previews are enabled, consisting of any data of the user's choosing. The existing data of the object itself is not exposed, but depending on the nature of the template being rendered, this may expose other database contents that would otherwise only be accessible to users with edit access over the model. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. This issue has been patched in versions 6.3.6, 7.0.4, 7.1.3, 7.2.2, and 7.3.

Affected products

wagtail
  • ==>= 6.4rc1, < 7.0.4
  • ==>= 7.1rc1, < 7.1.3
  • ==< 6.3.6
  • ==>= 7.2rc1, < 7.2.2
  • === 7.3rc1

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/wagtail/wagtail/security/advisories/GHSA-4qvv-g3vr-m348
NIXPKGS-2026-0095
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • ocamlPackages.melange
    • ocamlPackages.melange-json
    • ocamlPackages_latest.melange
    • ocamlPackages.melange-json-native
    • ocamlPackages_latest.melange-json
    • ocamlPackages_latest.melange-json-native
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
melange has a path traversal in license-path which allows reading files outside workspace

melange allows users to build apk packages using declarative pipelines. From version 0.14.0 to before 0.40.3, an attacker who can influence a melange configuration file (e.g., through pull request-driven CI or build-as-a-service scenarios) could read arbitrary files from the host system. The LicensingInfos function in pkg/config/config.go reads license files specified in copyright[].license-path without validating that paths remain within the workspace directory, allowing path traversal via ../ sequences. The contents of the traversed file are embedded into the generated SBOM as license text, enabling exfiltration of sensitive data through build artifacts. This issue has been patched in version 0.40.3.

Affected products

melange
  • ==>= 0.14.0, < 0.40.3

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/chainguard-dev/melange/security/advisories/GHSA-2w4f-9fgg-q2v9
Upstream patch: https://github.com/chainguard-dev/melange/commit/2f95c9f4355ed993f2670bf1bb82d88b0f65e9e4
NIXPKGS-2026-0096
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Navidrome affected by Denial of Service and disk exhaustion via oversized `size` parameter in `/rest/getCoverArt` and `/share/img/<token>` endpoints

Navidrome is an open source web-based music collection server and streamer. Prior to version 0.60.0, authenticated users can crash the Navidrome server by supplying an excessively large size parameter to /rest/getCoverArt or to a shared-image URL (/share/img/<token>). When processing such requests, the server attempts to create an extremely large resized image, causing uncontrolled memory growth. This triggers the Linux OOM killer, terminates the Navidrome process, and results in a full service outage. If the system has sufficient memory and survives the allocation, Navidrome then writes these extremely large resized images into its cache directory, allowing an attacker to rapidly exhaust server disk space as well. This issue has been patched in version 0.60.0.

Affected products

navidrome
  • ==< 0.60.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-hrr4-3wgr-68x3
Release notes: https://github.com/navidrome/navidrome/releases/tag/v0.60.0 (section Security)
NIXPKGS-2026-0097
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Improper File Access Controls Allow Arbitrary File Read by Authenticated Users

n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify workflows to read sensitive files from the n8n host system. This can be exploited to obtain critical configuration data and user credentials, leading to complete account takeover of any user on the instance. This issue has been patched in versions 1.123.18 and 2.5.0.

Affected products

n8n
  • ==< 2.5.0
  • ==< 1.123.18

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
NIXPKGS-2026-0098
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Has an Expression Escape Vulnerability Leading to RCE

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

Affected products

n8n
  • ==< 2.5.2
  • ==< 1.123.17

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
NIXPKGS-2026-0099
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • mastodon-bot
    • bitlbee-mastodon
    • mastodon-archive
    • nodePackages.mastodon-bot
    • python312Packages.mastodon-py
    • python313Packages.mastodon-py
    • python314Packages.mastodon-py
    • nodePackages_latest.mastodon-bot
    • home-assistant-component-tests.mastodon
    • tests.home-assistant-component-tests.mastodon
    • wordpressPackages.plugins.simple-mastodon-verification
  • @LeSuisse removed
    9 maintainers
    • @ju1m
    • @erictapen
    • @ghuntley
    • @dotlambda
    • @fabaff
    • @jpotier
    • @mweinelt
    • @Izorkin
    • @happy-river
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Mastodon's signature-dependent ActivityPub collection responses cached under signature-independent keys (Web Cache Poisoning via `Rails.cache`)

Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.3.19, 4.4.13, 4.5.6, Mastodon is vulnerable to web cache poisoning via `Rails.cache. When AUTHORIZED_FETCH is enabled, the ActivityPub endpoints for pinned posts and featured hashtags have contents that depend on the account that signed the HTTP request. However, these contents are stored in an internal cache and reused with no regards to the signing actor. As a result, an empty response generated for a blocked user account may be served to requests from legitimate non-blocked actors, or conversely, content intended for non-blocked actors may be returned to blocked actors. This issue has been patched in versions 4.3.19, 4.4.13, 4.5.6.

Affected products

mastodon
  • ==< 4.3.19
  • ==< 4.4.13
  • ==< 4.5.6

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)
Fixed in https://github.com/NixOS/nixpkgs/pull/486583 (unstable) and https://github.com/NixOS/nixpkgs/pull/486671 (25.11)
NIXPKGS-2026-0100
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @sweenu
    • @gepbird
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Vulnerable to Command Injection in Community Package Installation

n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3.

Affected products

n8n
  • ==>= 0.187.0, < 1.120.3

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
NIXPKGS-2026-0101
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @sweenu
    • @gepbird
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Improper CSP Enforcement in Webhook Responses May Allow Stored XSS

n8n is an open source workflow automation platform. Prior to version 1.123.2, a Cross-Site Scripting (XSS) vulnerability has been identified in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox protection intended to isolate HTML responses may not be applied correctly. An authenticated user with permission to create or modify workflows could abuse this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in version 1.123.2.

Affected products

n8n
  • ==< 1.123.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
NIXPKGS-2026-0102
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse published on GitHub
n8n is Vulnerable to Stored Cross-Site Scripting via Markdown Rendering in Workflow UI

n8n is an open source workflow automation platform. Prior to versions 1.123.9 and 2.2.1, a Cross-Site Scripting (XSS) vulnerability existed in a markdown rendering component used in n8n's interface, including workflow sticky notes and other areas that support markdown content. An authenticated user with permission to create or modify workflows could abuse this to execute scripts with same-origin privileges when other users interact with a maliciously crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in versions 1.123.9 and 2.2.1.

Affected products

n8n
  • ==< 1.123.9
  • ==< 2.2.1

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
NIXPKGS-2026-0109
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • terraform-providers.proxmox
    • terraform-providers.telmate_proxmox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
terraform-provider-proxmox has insecure sudo recommendation in the documentation

Terraform / OpenTofu Provider adds support for Proxmox Virtual Environment. Prior to version 0.93.1, in the SSH configuration documentation, the sudoer line suggested is insecure and can result in escaping the folder using ../, allowing any files on the system to be edited. This issue has been patched in version 0.93.1.

Affected products

terraform-provider-proxmox
  • ==< 0.93.1

Matching in nixpkgs

Upstream advisory: https://github.com/bpg/terraform-provider-proxmox/security/advisories/GHSA-gwch-7m8v-7544
Upstream patch: https://github.com/bpg/terraform-provider-proxmox/commit/bd604c41a31e2a55dd6acc01b0608be3ea49c023