Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0103

NIXPKGS-2026-0103
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    13 packages
    • typstPackages.minimalistic-latex-cv_0_1_1
    • typstPackages.minimalistic-latex-cv_0_1_0
    • chickenPackages_5.chickenEggs.alist-lib
    • haskellPackages.html-minimalist
    • ue4demos.realistic_rendering
    • akkuPackages.slib-alist
    • haskellPackages.alist
    • alisthelper
    • journalist
    • ultralist
    • alistral
    • surrealist
    • akkuPackages.pfds-alist
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Alist vulnerable to Path Traversal in multiple file operation handlers

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application contains path traversal vulnerability in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal, movement and copying across user boundaries within the same storage mount. This issue has been patched in version 3.57.0.

Affected products

alist
  • ==< 3.57.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/AlistGo/alist/security/advisories/GHSA-x4q4-7phh-42j9
Upstream patch: https://github.com/AlistGo/alist/commit/b188288525b9a35c76535139311e7c036dab057e