Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0203

NIXPKGS-2026-0203
published on 10 Feb 2026
updated 2 days, 2 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.litestar-htmx
    • python313Packages.litestar-htmx
    • python314Packages.litestar-htmx
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Litestar has a CORS origin allowlist bypass due to unescaped regex metacharacters in allowed origins

Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.allowed_origins_regex is constructed using a regex built from configured allowlist values and used with fullmatch() for validation. Because metacharacters are not escaped, a malicious origin can match unexpectedly. The check relies on allowed_origins_regex.fullmatch(origin). This vulnerability is fixed in 2.20.0.

Affected products

litestar
  • ==< 2.20.0

Matching in nixpkgs

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/litestar-org/litestar/security/advisories/GHSA-2p2x-hpg8-cqp2
Upstream patch: https://github.com/litestar-org/litestar/commit/eb87703b309efcc0d1b087dcb12784e76b003d5a