Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

created an hour ago
Gradle fails to disable repositories which can expose builds to malicious artifacts

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Affected products

gradle
  • ==< 9.3.0

Matching in nixpkgs

pkgs.gradle_9

Enterprise-grade build system

pkgs.gradle_9-unwrapped

Enterprise-grade build system

pkgs.gradle-dependency-tree-diff

Intelligent diff tool for the output of Gradle's dependencies task

created an hour ago
FreeRDP has a heap-buffer-overflow in audin_process_formats

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers: 1

created an hour ago
FreeRDP has a heap-use-after-free in create_irp_thread

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers: 1

created an hour ago
WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=DestinoControle)

WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.

Affected products

WeGIA
  • ==< 3.6.2

Matching in nixpkgs

pkgs.perlPackages.SnowballNorwegian

Porters stemming algorithm for norwegian

pkgs.perl538Packages.SnowballNorwegian

Porters stemming algorithm for norwegian

pkgs.perl540Packages.SnowballNorwegian

Porters stemming algorithm for norwegian

CVE-2026-0695
8.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created an hour ago
Stored XSS in Time Entry Audit Trail

In ConnectWise PSA versions older than 2026.1, Time Entry notes stored in the Time Entry Audit Trail may be rendered without applying output encoding to certain content. Under specific conditions, this may allow stored script code to execute in the context of a user’s browser when the affected content is displayed.

Affected products

PSA
  • ==All versions prior to 2026.1

Matching in nixpkgs

pkgs.mopsa

A Modular and Open Platform for Static Analysis using Abstract Interpretation

pkgs.svndumpsanitizer

Alternative to svndumpfilter that discovers which nodes should actually be kept

pkgs.phpPackages.psalm

Static analysis tool for finding errors in PHP applications

pkgs.ocamlPackages.mopsa

Modular and Open Platform for Static Analysis using Abstract Interpretation

pkgs.php82Packages.psalm

Static analysis tool for finding errors in PHP applications

pkgs.php83Packages.psalm

Static analysis tool for finding errors in PHP applications

pkgs.php84Packages.psalm

Static analysis tool for finding errors in PHP applications

pkgs.python312Packages.tapsaff

Provides an API for requesting information from taps-aff.co.uk

pkgs.python313Packages.tapsaff

Provides an API for requesting information from taps-aff.co.uk

pkgs.nodePackages.purescript-psa

Error/Warning reporting frontend for psc

pkgs.python312Packages.markupsafe

Implements a XML/HTML/XHTML Markup safe string

pkgs.python312Packages.psautohint

Script to normalize the XML and other data inside of a UFO

pkgs.python313Packages.markupsafe

Implements a XML/HTML/XHTML Markup safe string

pkgs.python313Packages.psautohint

Script to normalize the XML and other data inside of a UFO

pkgs.terraform-providers.vpsadmin

None

pkgs.nodePackages_latest.purescript-psa

Error/Warning reporting frontend for psc

pkgs.terraform-providers.vpsfreecz_vpsadmin

None

CVE-2021-47844
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created an hour ago
Xmind 2020 - Persistent Cross-Site Scripting

Xmind 2020 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into mind mapping files or custom headers. Attackers can craft malicious files with embedded JavaScript that execute system commands when opened, enabling remote code execution through mouse interactions or file opening.

Affected products

Xmind
  • ==2020

Matching in nixpkgs

pkgs.phpExtensions.maxminddb

C extension that is a drop-in replacement for MaxMind\Db\Reader

pkgs.php81Extensions.maxminddb

C extension that is a drop-in replacement for MaxMind\Db\Reader

pkgs.php82Extensions.maxminddb

C extension that is a drop-in replacement for MaxMind\Db\Reader

pkgs.php83Extensions.maxminddb

C extension that is a drop-in replacement for MaxMind\Db\Reader

pkgs.php84Extensions.maxminddb

C extension that is a drop-in replacement for MaxMind\Db\Reader

Package maintainers: 9

CVE-2025-14822
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created an hour ago
DoS from quadratic complexity in model.ParseHashtags

Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens

Affected products

Mattermost
  • ==10.11.9
  • ==11.2.0
  • =<10.11.8

Matching in nixpkgs

pkgs.mattermost

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

pkgs.mattermostLatest

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

Package maintainers: 8

CVE-2026-23724
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created an hour ago
WeGIA Stored Cross-Site Scripting (XSS) – atendido_idatendido Parameter on Occurrence Registration Page

WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the html/atendido/cadastro_ocorrencia.php endpoint of the WeGIA application. The application does not sanitize user-controlled data before rendering it inside the “Atendido” selection dropdown. This vulnerability is fixed in 3.6.2.

Affected products

WeGIA
  • ==< 3.6.2

Matching in nixpkgs

pkgs.perlPackages.SnowballNorwegian

Porters stemming algorithm for norwegian

pkgs.perl538Packages.SnowballNorwegian

Porters stemming algorithm for norwegian

pkgs.perl540Packages.SnowballNorwegian

Porters stemming algorithm for norwegian

CVE-2025-24022
8.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created an hour ago
iTop server vulnerable to portal code injection

iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, server code execution is possible through the frontend of iTop's portal. This is fixed in versions 2.7.12, 3.1.3 and 3.2.1.

Affected products

iTop
  • ==>= 3.0.0, < 3.1.3
  • ==< 2.7.12
  • ==>= 3.2.0, < 3.2.1

Matching in nixpkgs

pkgs.nvitop

Interactive NVIDIA-GPU process viewer, the one-stop solution for GPU process management

pkgs.python312Packages.anitopy

Python library for parsing anime video filenames

pkgs.python313Packages.anitopy

Python library for parsing anime video filenames

Package maintainers: 7

created an hour ago
WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=TipoSaidaControle)

WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=TipoSaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.

Affected products

WeGIA
  • ==< 3.6.2

Matching in nixpkgs

pkgs.perlPackages.SnowballNorwegian

Porters stemming algorithm for norwegian

pkgs.perl538Packages.SnowballNorwegian

Porters stemming algorithm for norwegian

pkgs.perl540Packages.SnowballNorwegian

Porters stemming algorithm for norwegian