Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0045
published on 19 Jan 2026
Permalink CVE-2026-23829
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Mailpit has SMTP Header Injection via Regex Bypass

Mailpit is an email testing tool and API for developers. Prior to version 1.28. Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue.

Affected products

mailpit
  • ==< 1.28.3

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/axllent/mailpit/security/advisories/GHSA-54wq-72mp-cq7c
Upstream fix: https://github.com/axllent/mailpit/commit/36cc06c125954dec6673219dafa084e13cc14534
NIXPKGS-2026-0044
published on 19 Jan 2026
Permalink CVE-2026-23626
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kimai Vulnerable to Authenticated Server-Side Template Injection (SSTI)

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.

Affected products

kimai
  • ==< 2.46.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/kimai/kimai/security/advisories/GHSA-jg2j-2w24-54cg
Upstream fix: https://github.com/kimai/kimai/commit/6a86afb5fd79f6c1825060b87c09bd1909c2e86f
NIXPKGS-2026-0033
published on 18 Jan 2026
Permalink CVE-2025-68675
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: proxy credentials for various providers might leak in task logs

In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue

Affected products

apache-airflow
  • <3.1.6

Matching in nixpkgs

Package maintainers

Upstream advisory: https://lists.apache.org/thread/x6kply4nqd4vc4wgxtm6g9r2tt63s8c5
NIXPKGS-2026-0035
published on 18 Jan 2026
Permalink CVE-2025-11731
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.libxslt
    • python313Packages.libxslt
  • @LeSuisse removed maintainer @jtojnar
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxslt: type confusion in exsltfuncresultcompfunction of libxslt

A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT <func:result> elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.

Affected products

rhcos
libxslt
  • <1.1.44

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0029
published on 18 Jan 2026
Permalink CVE-2026-0990
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
    • perl540Packages.AlienLibxml2
    • perl538Packages.AlienLibxml2
    • python313Packages.libxml2
    • python312Packages.libxml2
    • perlPackages.AlienLibxml2
    • sbclPackages.cl-libxml2
    • libxml2Python
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.

References

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Upstream issue: https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1961208e958ca22f80a0b4e4c9d71cfa050aa982
NIXPKGS-2026-0034
published on 18 Jan 2026
Permalink CVE-2025-12105
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
    • libsoup_2_4
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libsoup: heap use-after-free in libsoup message queue handling during http/2 read completion

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.

References

Affected products

libsoup
  • =<3.6.5
libsoup3
  • *

Matching in nixpkgs

Package maintainers

Upstream fix: https://gitlab.gnome.org/GNOME/libsoup/-/commit/9ba1243a24e442fa5ec44684617a4480027da960
NIXPKGS-2026-0038
published on 18 Jan 2026
Permalink CVE-2025-62400
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed
    2 maintainers
    • @kmein
    • @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: hidden group names visible to event creators

Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information.

References

Affected products

moodle
  • <4.1.21
  • <4.5.7
  • <4.4.11
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0040
published on 18 Jan 2026
Permalink CVE-2025-62397
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed
    2 maintainers
    • @kmein
    • @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: router produces json instead of 404 error for invalid course id

The router’s inconsistent response to invalid course IDs allowed attackers to infer which course IDs exist, potentially aiding reconnaissance.

References

Affected products

moodle
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0031
published on 18 Jan 2026
Permalink CVE-2025-14017
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • wcurl
    • curlie
    • curlpp
    • phpExtensions.curl
    • curl-impersonate
    • curlWithGnuTls
    • curlMinimal
    • guile-curl
    • curlftpfs
    • curlHTTP3
    • grpcurl
  • @LeSuisse added package curlMinimal
  • @LeSuisse removed
    33 packages
    • curl-impersonate-ff
    • ocamlPackages.curly
    • ocamlPackages.ocurl
    • tclPackages.tclcurl
    • haskellPackages.curl
    • luaPackages.lua-curl
    • perlPackages.WWWCurl
    • php81Extensions.curl
    • php82Extensions.curl
    • php83Extensions.curl
    • haskellPackages.curlhs
    • php84Extensions.curl
    • lua51Packages.lua-curl
    • lua52Packages.lua-curl
    • lua53Packages.lua-curl
    • lua54Packages.lua-curl
    • curl-impersonate-chrome
    • luajitPackages.lua-curl
    • perl538Packages.WWWCurl
    • perl540Packages.WWWCurl
    • haskellPackages.hxt-curl
    • python312Packages.pycurl
    • python313Packages.pycurl
    • python312Packages.curlify
    • python313Packages.curlify
    • tests.pkg-config.defaultPkgConfigPackages.libcurl
    • haskellPackages.recurly-client
    • haskellPackages.curly-expander
    • haskellPackages.curl-cookiejar
    • haskellPackages.download-curl
    • python313Packages.curl-cffi
    • python312Packages.curl-cffi
    • typstPackages.curli_0_1_0
  • @LeSuisse removed
    2 maintainers
    • @Scrumplex
    • @lovek323
  • @LeSuisse added
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse removed
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
broken TLS options for threaded LDAPS

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

Affected products

curl
  • =<7.49.1
  • =<8.12.0
  • =<7.50.2
  • =<7.75.0
  • =<7.18.1
  • =<8.1.1
  • =<7.55.1
  • =<7.37.0
  • =<7.46.0
  • =<7.28.0
  • =<7.21.0
  • =<8.14.1
  • =<7.64.0
  • =<7.64.1
  • =<7.24.0
  • =<7.65.2
  • =<7.27.0
  • =<7.21.4
  • =<7.33.0
  • =<7.37.1
  • =<7.23.0
  • =<8.2.0
  • =<7.22.0
  • =<7.47.0
  • =<7.62.0
  • =<7.21.1
  • =<7.19.5
  • =<7.77.0
  • =<7.40.0
  • =<7.26.0
  • =<8.11.0
  • =<7.72.0
  • =<8.8.0
  • =<8.12.1
  • =<7.18.0
  • =<7.36.0
  • =<7.66.0
  • =<7.38.0
  • =<7.88.1
  • =<7.30.0
  • =<7.65.0
  • =<7.81.0
  • =<8.9.0
  • =<7.79.1
  • =<8.6.0
  • =<8.7.1
  • =<7.63.0
  • =<7.70.0
  • =<7.21.2
  • =<7.67.0
  • =<7.56.1
  • =<7.65.3
  • =<7.54.1
  • =<8.13.0
  • =<7.56.0
  • =<7.54.0
  • =<7.55.0
  • =<7.84.0
  • =<7.19.3
  • =<7.88.0
  • =<7.19.2
  • =<7.76.1
  • =<7.50.0
  • =<7.47.1
  • =<7.39.0
  • =<7.19.0
  • =<7.42.0
  • =<7.28.1
  • =<8.4.0
  • =<7.71.0
  • =<7.17.0
  • =<7.19.1
  • =<7.17.1
  • =<7.31.0
  • =<7.19.6
  • =<7.73.0
  • =<8.14.0
  • =<7.82.0
  • =<7.52.0
  • =<7.42.1
  • =<8.2.1
  • =<8.0.1
  • =<7.86.0
  • =<7.68.0
  • =<8.1.0
  • =<7.50.3
  • =<8.5.0
  • =<7.52.1
  • =<7.21.3
  • =<8.10.0
  • =<7.69.1
  • =<7.45.0
  • =<7.59.0
  • =<7.34.0
  • =<7.20.0
  • =<7.35.0
  • =<7.21.6
  • =<7.48.0
  • =<8.10.1
  • =<7.49.0
  • =<7.65.1
  • =<7.78.0
  • =<7.18.2
  • =<7.58.0
  • =<7.21.7
  • =<7.79.0
  • =<8.16.0
  • =<7.43.0
  • =<7.20.1
  • =<7.71.1
  • =<7.61.0
  • =<7.23.1
  • =<8.15.0
  • =<7.83.0
  • =<7.51.0
  • =<7.19.4
  • =<8.11.1
  • =<7.80.0
  • =<7.25.0
  • =<7.87.0
  • =<7.29.0
  • =<7.60.0
  • =<8.0.0
  • =<7.21.5
  • =<7.61.1
  • =<7.44.0
  • =<7.53.1
  • =<7.50.1
  • =<7.57.0
  • =<7.19.7
  • =<7.74.0
  • =<8.7.0
  • =<7.76.0
  • =<7.85.0
  • =<8.9.1
  • =<8.17.0
  • =<7.32.0
  • =<8.3.0
  • =<7.83.1
  • =<7.69.0
  • =<7.53.0
  • =<8.1.2
  • =<7.41.0

Matching in nixpkgs

pkgs.curl

Command line tool for transferring files with URL syntax

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-0039
published on 18 Jan 2026
Permalink CVE-2025-62393
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: course access permissions not properly checked in course_output_fragment_course_overview

A flaw was found in the course overview output function where user access permissions were not fully enforced. This could allow unauthorized users to view information about courses they should not have access to, potentially exposing limited course details.

References

Affected products

moodle
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)