Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0582
published on 9 Mar 2026
updated 5 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
mkj Dropbear S Range Check curve25519.c unpackneg signature verification

A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.

Affected products

Dropbear
  • ==2025.72
  • ==2025.76
  • ==2025.6
  • ==2025.51
  • ==2025.39
  • ==2025.88
  • ==2025.46
  • ==2025.78
  • ==2025.0
  • ==2025.80
  • ==2025.48
  • ==2025.32
  • ==2025.29
  • ==2025.56
  • ==2025.67
  • ==2025.27
  • ==2025.74
  • ==2025.34
  • ==2025.10
  • ==2025.57
  • ==2025.18
  • ==2025.33
  • ==2025.44
  • ==2025.28
  • ==2025.75
  • ==2025.84
  • ==2025.40
  • ==2025.59
  • ==2025.31
  • ==2025.11
  • ==2025.17
  • ==2025.4
  • ==2025.86
  • ==2025.87
  • ==2025.16
  • ==2025.65
  • ==2025.64
  • ==2025.43
  • ==2025.55
  • ==2025.50
  • ==2025.61
  • ==2025.82
  • ==2025.15
  • ==2025.8
  • ==2025.41
  • ==2025.52
  • ==2025.85
  • ==2025.69
  • ==2025.35
  • ==2025.63
  • ==2025.68
  • ==2025.13
  • ==2025.24
  • ==2025.30
  • ==2025.45
  • ==2025.38
  • ==2025.81
  • ==2025.21
  • ==2025.54
  • ==2025.22
  • ==2025.89
  • ==2025.3
  • ==2025.23
  • ==2025.2
  • ==2025.47
  • ==2025.62
  • ==2025.1
  • ==2025.58
  • ==2025.83
  • ==2025.53
  • ==2025.70
  • ==2025.9
  • ==2025.49
  • ==2025.26
  • ==2025.5
  • ==2025.73
  • ==2025.79
  • ==2025.37
  • ==2025.71
  • ==2025.14
  • ==2025.25
  • ==2025.66
  • ==2025.77
  • ==2025.36
  • ==2025.19
  • ==2025.20
  • ==2025.42
  • ==2025.12
  • ==2025.60
  • ==2025.7

Matching in nixpkgs

Package maintainers

https://github.com/mkj/dropbear/issues/406#issue-3978907798
https://github.com/mkj/dropbear/pull/407
NIXPKGS-2026-0567
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    5 packages
    • python312Packages.pyloadapi
    • python313Packages.pyloadapi
    • python314Packages.pyloadapi
    • home-assistant-component-tests.pyload
    • tests.home-assistant-component-tests.pyload
  • @mweinelt accepted
  • @mweinelt published on GitHub
pyLoad: Arbitrary File Write via Path Traversal in edit_package()

pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.

Affected products

pyload
  • ==>= 0.5.0b3.dev13, < 0.5.0b3.dev97

Matching in nixpkgs

Ignored packages (5)

Package maintainers

Upstream advisory: https://github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjw
NIXPKGS-2026-0566
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Snipe-IT < 8.3.7 Mass Assignment Vulnerability Leading to Privilege Escalation

Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricted fields of another user account, including the Super Admin account. By changing the email address of the Super Admin and triggering a password reset, an attacker can fully take over the Super Admin account, resulting in complete administrative control of the Snipe-IT instance.

Affected products

Snipe-IT
  • <8.3.7

Matching in nixpkgs

Package maintainers

NixOS Unstable: https://github.com/NixOS/nixpkgs/commit/ab0b678bb6d6b564079108ff431e6fb01d1b492e
NixOS 25.11: https://github.com/NixOS/nixpkgs/pull/486331 (unmerged)
NIXPKGS-2026-0569
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package zitadel-tools
  • @mweinelt accepted
  • @mweinelt published on GitHub
ZITADEL: 1-Click Account Takeover via XSS in /saml-post Endpoint

ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0.

Affected products

zitadel
  • ==>= 4.0.0, < 4.12.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-pr34-2v5x-6qjq
NIXPKGS-2026-0574
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package zitadel-tools
  • @mweinelt accepted
  • @mweinelt published on GitHub
ZITADEL: Account Takeover Due to Improper Instance Validation in V2 Login

ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.

Affected products

zitadel
  • ==>= 4.0.0-rc.1, < 4.7.1

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-pfrf-9r5f-73f5
NIXPKGS-2026-0579
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
It was discovered that dpkg-deb (a component of dpkg, the …

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

Affected products

dpkg
  • <1.23.6

Matching in nixpkgs

Package maintainers

Upstream issue: https://bugs.debian.org/challenge.html?original=%2f1129722
Patch: https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=6610297a62c0780dd0e80b0e302ef64fdcc9d313
NIXPKGS-2026-0576
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    33 packages
    • rubyPackages_4_0.jekyll-commonmark-ghpages
    • rubyPackages_3_4.jekyll-commonmark-ghpages
    • rubyPackages_3_3.jekyll-commonmark-ghpages
    • guile-commonmark
    • rubyPackages.commonmarker
    • haskellPackages.commonmark
    • python312Packages.commonmark
    • python313Packages.commonmark
    • python314Packages.commonmark
    • rubyPackages_3_1.commonmarker
    • rubyPackages_3_2.commonmarker
    • rubyPackages_3_3.commonmarker
    • rubyPackages_3_4.commonmarker
    • rubyPackages_4_0.commonmarker
    • haskellPackages.commonmark-cli
    • python312Packages.recommonmark
    • python313Packages.recommonmark
    • python314Packages.recommonmark
    • rubyPackages.jekyll-commonmark
    • tests.nixosOptionsDoc.commonMark
    • haskellPackages.commonmark-pandoc
    • haskellPackages.commonmark-simple
    • haskellPackages.commonmark-initial
    • rubyPackages_3_1.jekyll-commonmark
    • rubyPackages_3_2.jekyll-commonmark
    • rubyPackages_3_3.jekyll-commonmark
    • rubyPackages_3_4.jekyll-commonmark
    • rubyPackages_4_0.jekyll-commonmark
    • haskellPackages.commonmark-wikilink
    • haskellPackages.commonmark-extensions
    • rubyPackages.jekyll-commonmark-ghpages
    • rubyPackages_3_1.jekyll-commonmark-ghpages
    • rubyPackages_3_2.jekyll-commonmark-ghpages
  • @mweinelt accepted
  • @mweinelt published on GitHub
league/commonmark: DisallowedRawHtml extension bypass via whitespace in HTML tag names

league/commonmark is a PHP Markdown parser. Prior to version 2.8.1, the DisallowedRawHtml extension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing >. For example, <script\n> would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input. All applications using the DisallowedRawHtml extension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected. This issue has been patched in version 2.8.1.

Affected products

commonmark
  • ==< 2.8.1
Ignored packages (33)
Affects flarum per composer.lock file
@jasondoom @fsagbuya
NIXPKGS-2026-0571
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package zitadel-tools
  • @mweinelt accepted
  • @mweinelt published on GitHub
ZITADEL: Bypassing Zitadel Login Behavior and Security Policy in Login V2

ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password even if corresponding options were disabled in their organizaton. This issue has been patched in version 4.12.1.

Affected products

zitadel
  • ==>= 4.0.0, < 4.12.1

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-25rw-g6ff-fmg8
NIXPKGS-2026-0572
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Netmaker: Service User with Network Access Can Access config files with WireGuard Private Keys

Netmaker makes networks with WireGuard. Prior to version 1.5.0, a user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership. This issue has been patched in version 1.5.0.

Affected products

netmaker
  • ==< 1.5.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/gravitl/netmaker/security/advisories/GHSA-4hgg-c4rr-6h7f
NIXPKGS-2026-0568
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Defuddle: XSS via unescaped string interpolation in _findContentBySchemaText image tag

Defuddle cleans up HTML pages. Prior to version 0.9.0, the _findContentBySchemaText method in src/defuddle.ts interpolates image src and alt attributes directly into an HTML string without escaping. An attacker can use a " in the alt attribute to break out of the attribute context and inject event handler. This issue has been patched in version 0.9.0.

Affected products

defuddle
  • ==< 0.9.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/kepano/defuddle/security/advisories/GHSA-5mq8-78gm-pjmq