Published issues
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Zammad has Cross-site request forgery (CSRF) in OAuth callback endpoints
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the OAuth callback endpoints for Microsoft, Google, and Facebook external credentials do not validate a CSRF state parameter. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
Permalink
CVE-2026-40026
4.4 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read
The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the ISO9660 filesystem parser where the parse_susp() function trusts len_id, len_des, and len_src fields from the disk image to memcpy data into a stack buffer without verifying that the source data falls within the parsed SUSP block. An attacker can craft a malicious ISO image that causes reads past the end of the SUSP data buffer, and a zero-length SUSP entry can trigger an infinite parsing loop.
Affected products
sleuthkit
-
==a95b0ac21733b059a517aaefa667a17e1bcbdee1
-
=<4.14.0
Matching in nixpkgs
Forensic/data recovery tool
Permalink
CVE-2026-39844
5.9 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.nicegui-highcharts
- python313Packages.nicegui-highcharts
- python314Packages.nicegui-highcharts
2 weeks, 6 days ago
NiceGUI has a Path Traversal in NiceGUI Upload Filename on Windows via Backslash Bypass of PurePosixPath Sanitization
NiceGUI is a Python-based UI framework. Prior to 3.10.0, Since PurePosixPath only recognizes forward slashes (/) as path separators, an attacker can bypass this sanitization on Windows by using backslashes (\) in the upload filename. Applications that construct file paths using file.name (a pattern demonstrated in NiceGUI's bundled examples) are vulnerable to arbitrary file write on Windows. This vulnerability is fixed in 3.10.0.
Matching in nixpkgs
Module to create web-based user interfaces
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
Module to create web-based user interfaces
-
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
Module to create web-based user interfaces
Ignored packages (3)
NiceGUI with support for Highcharts
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
NiceGUI with support for Highcharts
-
-
-
nixos-25.11-small
3.1.0
-
nixpkgs-25.11-darwin
3.1.0
NiceGUI with support for Highcharts
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Zammad is miissing authorization in AI assistance controller for context data used in text tools
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, he REST endpoint POST /api/v1/ai_assistance/text_tools/:id contains an authorization failure. Context data (e.g., a group or organization) supplied to be used in the AI prompt were not checked if they are accessible for the current user. This leads to having data present in the AI prompt that were not authorized before being used. A user needs to have ticket.agent permission to be able to use the provided context data. This vulnerability is fixed in 7.0.1.
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Zammad has a Server-side request forgery (SSRF) via webhooks
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the webhook model was missing a proper validation for loop back addresses, or link-local addresses — only the URL scheme (HTTP/HTTPS) as well as the hostname was checked. This could end up in retrieving confidential metadata of cloud/hosting providers. The existing check is now extended and is applied when configuring webhooks as well as triggering webhook jobs. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Zammad improperly neutralizes of script-related HTML tags in ticket articles
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the HTML sanitizer for ticket articles was missing proper sanitization of data: ... URI schemes, resulting in storing such malicious content in the database of the Zammad instance. The Zammad GUI is rendering this content, due to applied CSP rules no harm was done by e.g., clicking such a link. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Zammad has an origin validation error in SSO mechanism
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the SSO mechanism in Zammad was not verifying the header originates from a trusted SSO proxy/gateway before applying further actions on it. This vulnerability is fixed in 7.0.1 and 6.5.4.
Affected products
zammad
-
==< 6.5.4
-
==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
Permalink
CVE-2026-40024
7.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): NONE
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Sleuth Kit tsk_recover Path Traversal
The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
Affected products
sleuthkit
-
==a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b
-
=<4.14.0
Matching in nixpkgs
Forensic/data recovery tool
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
ignored
3 packages
- python312Packages.zammad-py
- python313Packages.zammad-py
- python314Packages.zammad-py
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Zammad has improper access control in AI assistance controller for text tools
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the REST endpoint POST /api/v1/ai_assistance/text_tools/:id was not checking if a user is privileged to use the text tool, resulting in being able to use it in all situations. This vulnerability is fixed in 7.0.1 and 6.5.4.
Matching in nixpkgs
Zammad, a web-based, open source user support/ticketing solution
-
-
-
nixos-25.11-small
7.0.0
-
nixpkgs-25.11-darwin
7.0.0
Ignored packages (3)
Python API client for accessing zammad REST API
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
-
-
-
nixos-25.11-small
3.2.0
-
nixpkgs-25.11-darwin
3.2.0
Python API client for accessing zammad REST API
Permalink
CVE-2026-40025
4.4 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
2 weeks, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
2 weeks, 6 days ago
-
@LeSuisse
accepted
2 weeks, 6 days ago
-
@LeSuisse
published on GitHub
2 weeks, 6 days ago
Sleuth Kit APFS Keybag Parser Out-of-Bounds Read
The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the APFS filesystem keybag parser where the wrapped_key_parser class follows attacker-controlled length fields without bounds checking, causing heap reads past the allocated buffer. An attacker can craft a malicious APFS disk image that triggers information disclosure or crashes when processed by any Sleuth Kit tool that parses APFS volumes.
Affected products
sleuthkit
-
=<4.14.0
-
==8b9c9e7d493bd68624f3b1a3963edd45c3ff7611
Matching in nixpkgs
Forensic/data recovery tool