Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0573
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Netmaker: Insufficient Authorization in Host Token Verification

Netmaker makes networks with WireGuard. Prior to version 1.5.0, the Authorize middleware in Netmaker incorrectly validates host JWT tokens. When a route permits host authentication (hostAllowed=true), a valid host token bypasses all subsequent authorization checks without verifying that the host is authorized to access the specific requested resource. Any entity possessing knowledge of object identifiers (node IDs, host IDs) can craft a request with an arbitrary valid host token to access, modify, or delete resources belonging to other hosts. Affected endpoints include node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. This issue has been patched in version 1.5.0.

Affected products

netmaker
  • ==< 1.5.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/gravitl/netmaker/security/advisories/GHSA-hmqr-wjmj-376c
NIXPKGS-2026-0571
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package zitadel-tools
  • @mweinelt accepted
  • @mweinelt published on GitHub
ZITADEL: Bypassing Zitadel Login Behavior and Security Policy in Login V2

ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password even if corresponding options were disabled in their organizaton. This issue has been patched in version 4.12.1.

Affected products

zitadel
  • ==>= 4.0.0, < 4.12.1

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-25rw-g6ff-fmg8
NIXPKGS-2026-0578
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Netmaker: Denial of Service via Server Shutdown Endpoint

Netmaker makes networks with WireGuard. Prior to version 1.2.0, the /api/server/shutdown endpoint allows termination of the Netmaker server process via syscall.SIGINT. This allows any user to repeatedly shut down the server, causing cyclic denial of service with approximately 3-second restart intervals. This issue has been patched in version 1.2.0.

Affected products

netmaker
  • ==< 1.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/gravitl/netmaker/security/advisories/GHSA-rhr9-hgcm-x289
NIXPKGS-2026-0566
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Snipe-IT < 8.3.7 Mass Assignment Vulnerability Leading to Privilege Escalation

Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricted fields of another user account, including the Super Admin account. By changing the email address of the Super Admin and triggering a password reset, an attacker can fully take over the Super Admin account, resulting in complete administrative control of the Snipe-IT instance.

Affected products

Snipe-IT
  • <8.3.7

Matching in nixpkgs

Package maintainers

NixOS Unstable: https://github.com/NixOS/nixpkgs/commit/ab0b678bb6d6b564079108ff431e6fb01d1b492e
NixOS 25.11: https://github.com/NixOS/nixpkgs/pull/486331 (unmerged)
NIXPKGS-2026-0569
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package zitadel-tools
  • @mweinelt accepted
  • @mweinelt published on GitHub
ZITADEL: 1-Click Account Takeover via XSS in /saml-post Endpoint

ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0.

Affected products

zitadel
  • ==>= 4.0.0, < 4.12.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-pr34-2v5x-6qjq
NIXPKGS-2026-0574
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package zitadel-tools
  • @mweinelt accepted
  • @mweinelt published on GitHub
ZITADEL: Account Takeover Due to Improper Instance Validation in V2 Login

ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.

Affected products

zitadel
  • ==>= 4.0.0-rc.1, < 4.7.1

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-pfrf-9r5f-73f5
NIXPKGS-2026-0564
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Ettercap etterfilter ef_output.c add_data_segment out-of-bounds

A vulnerability has been found in Ettercap 0.8.4-Garofalo. Affected by this vulnerability is the function add_data_segment of the file src/ettercap/utils/etterfilter/ef_output.c of the component etterfilter. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Ettercap
  • ==0.8.4-Garofalo

Matching in nixpkgs

Package maintainers

Upstream issue: https://github.com/Ettercap/ettercap/issues/1297
NIXPKGS-2026-0579
published on 8 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
It was discovered that dpkg-deb (a component of dpkg, the …

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

Affected products

dpkg
  • <1.23.6

Matching in nixpkgs

Package maintainers

Upstream issue: https://bugs.debian.org/challenge.html?original=%2f1129722
Patch: https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=6610297a62c0780dd0e80b0e302ef64fdcc9d313
NIXPKGS-2026-0563
published on 7 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
An open redirect vulnerability exists in django-allauth versions prior to …

An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.

Affected products

django-allauth
  • ==prior to 65.14.1

Matching in nixpkgs

Package maintainers

https://allauth.org/news/2026/02/django-allauth-65.14.1-released/
NIXPKGS-2026-0528
published on 7 Mar 2026
updated 1 week ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
CoreDNS Loop Detection Denial of Service Vulnerability

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that terminates the entire process. This issue has been patched in version 1.14.2.

Affected products

coredns
  • ==< 1.14.2

Matching in nixpkgs

Package maintainers