CVE-2025-23440 6.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 3 months ago WordPress radSLIDE plugin <= 2.1 - Broken Access Control to Stored Cross-Site Scripting vulnerability Missing Authorization vulnerability in radicaldesigns radSLIDE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects radSLIDE: from n/a through 2.1. Affected products radslide =<2.1 Matching in nixpkgs pkgs.typstPackages.gradslide_0_1_0 Simple component to show a value between 0 and 1 on a nice gradient slider nixos-unstable ??? nixpkgs-unstable 0.1.0 Package maintainers: 1 @cherrypiejam Gongqi Huang
pkgs.typstPackages.gradslide_0_1_0 Simple component to show a value between 0 and 1 on a nice gradient slider nixos-unstable ??? nixpkgs-unstable 0.1.0
CVE-2025-26466 5.9 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 3 months ago Openssh: denial-of-service in openssh A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. Affected products rhcos OpenSSH =<9.9p1 openssh Matching in nixpkgs pkgs.openssh Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.opensshTest Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_hpn Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_gssapi Implementation of the SSH protocol with GSSAPI support nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.opensshWithKerberos Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_hpnWithKerberos Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.perlPackages.NetOpenSSH Perl SSH client package implemented on top of OpenSSH nixos-unstable ??? nixpkgs-unstable 0.84 pkgs.lxqt.lxqt-openssh-askpass GUI to query passwords on behalf of SSH agents nixos-unstable ??? nixpkgs-unstable 2.2.0 pkgs.perl538Packages.NetOpenSSH Perl SSH client package implemented on top of OpenSSH nixos-unstable ??? nixpkgs-unstable 0.84 pkgs.perl540Packages.NetOpenSSH Perl SSH client package implemented on top of OpenSSH nixos-unstable ??? nixpkgs-unstable 0.84 Package maintainers: 7 @Conni2461 Simon Hauser <simon-hauser@outlook.com> @philiptaron Philip Taron <philip.taron@gmail.com> @helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de> @numinit Morgan Jones <me+nixpkgs@numin.it> @dasJ Janne Heß <janne@hess.ooo> @wahjava Ashish SHUKLA <ashish.is@lostca.se> @romildo José Romildo Malaquias <malaquias@gmail.com>
pkgs.openssh_hpn Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.openssh_gssapi Implementation of the SSH protocol with GSSAPI support nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.opensshWithKerberos Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.openssh_hpnWithKerberos Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.perlPackages.NetOpenSSH Perl SSH client package implemented on top of OpenSSH nixos-unstable ??? nixpkgs-unstable 0.84
pkgs.lxqt.lxqt-openssh-askpass GUI to query passwords on behalf of SSH agents nixos-unstable ??? nixpkgs-unstable 2.2.0
pkgs.perl538Packages.NetOpenSSH Perl SSH client package implemented on top of OpenSSH nixos-unstable ??? nixpkgs-unstable 0.84
pkgs.perl540Packages.NetOpenSSH Perl SSH client package implemented on top of OpenSSH nixos-unstable ??? nixpkgs-unstable 0.84
CVE-2025-26932 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago WordPress WPBot plugin <= 6.3.5 - Local File Inclusion vulnerability Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in QuantumCloud ChatBot allows PHP Local File Inclusion. This issue affects ChatBot: from n/a through 6.3.5. Affected products chatbot =<6.3.5 Matching in nixpkgs pkgs.gnomeExtensions.penguin-ai-chatbot A GNOME Shell extension that provides a chatbot interface using various LLM providers, including Anthropic, OpenAI, Gemini, and OpenRouter. Features include multiple provider support, customizable models, chat history, customizable appearance, a keyboard shortcut, and copy-to-clipboard functionality. nixos-unstable ??? nixpkgs-unstable 22 Package maintainers: 1 @honnip Jung seungwoo <me@honnip.page>
pkgs.gnomeExtensions.penguin-ai-chatbot A GNOME Shell extension that provides a chatbot interface using various LLM providers, including Anthropic, OpenAI, Gemini, and OpenRouter. Features include multiple provider support, customizable models, chat history, customizable appearance, a keyboard shortcut, and copy-to-clipboard functionality. nixos-unstable ??? nixpkgs-unstable 22
CVE-2025-26600 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: use-after-free in playreleasedevents() A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-26598 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: out-of-bounds write in createpointerbarrierclient() An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-26599 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: use of uninitialized pointer in compredirectwindow() An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-26594 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago X.org: xwayland: use-after-free of the root cursor A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-26597 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: buffer overflow in xkbchangetypesofkey() A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-26915 8.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): LOW created 3 months ago WordPress Wishlist Plugin <= 1.0.41 - SQL Injection vulnerability Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PickPlugins Wishlist allows SQL Injection. This issue affects Wishlist: from n/a through 1.0.41. Affected products wishlist =<1.0.41 Matching in nixpkgs pkgs.wishlist Single entrypoint for multiple SSH endpoints nixos-unstable ??? nixpkgs-unstable 0.15.2 Package maintainers: 2 @caarlos0 Carlos A Becker <carlos@becker.software> @penguwin Nicolas Martin <penguwin@penguwin.eu>
pkgs.wishlist Single entrypoint for multiple SSH endpoints nixos-unstable ??? nixpkgs-unstable 0.15.2
CVE-2025-26595 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: buffer overflow in xkbvmodmasktext() A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0