Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: frigate

Found 4 matching suggestions

View:
Compact
Detailed
Dismissed
Permalink CVE-2026-33125
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
updated an hour ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    2 packages
    • pkgsRocm.frigate
    • home-assistant-custom-components.frigate
  • @mweinelt dismissed
Frigate Broken Access Control: Users assigned the viewer role can delete admin and other low-privileged accounts

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In versions 0.16.2 and below, users with the viewer role can delete admin and low-privileged user accounts. Exploitation can lead to DoS and affect data integrity. This issue has been patched in version 0.16.3.

Affected products

frigate
  • ==< 0.16.3

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Fixed in 0.16.3.
Dismissed
Permalink CVE-2026-33126
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated an hour ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    2 packages
    • pkgsRocm.frigate
    • home-assistant-custom-components.frigate
  • @mweinelt dismissed
Frigate has SSRF vulnerability in /ffprobe endpoint

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to version 0.16.3, the /ffprobe endpoint accepts arbitrary user-controlled URLs without proper validation, allowing Server-Side Request Forgery (SSRF) attacks. An attacker can use the Frigate server to make HTTP requests to internal network resources, cloud metadata services, or perform port scanning. This issue has been patched in version 0.16.3.

Affected products

frigate
  • ==< 0.16.3

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Fixed in 0.16.3
Untriaged
created 1 day, 11 hours ago
Frigate has insecure password change functionality

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Versions prior to 0.17.0-beta1 allow any authenticated user to change their own password without verifying the current password through the /users/{username}/password endpoint. Changing a password does not invalidate existing JWT tokens, and there is no validation of password strength. If an attacker obtains a valid session token (e.g., via accidentally exposed JWT, stolen cookie, XSS, compromised device, or sniffing over HTTP), they can change the victim’s password and gain permanent control of the account. Since password changes do not invalidate existing JWT tokens, session hijacks persist even after a password reset. Additionally, the lack of password strength validation exposes accounts to brute-force attacks. This issue has been resolved in version 0.17.0-beta1.

Affected products

frigate
  • ==< 0.17.0-beta1

Matching in nixpkgs

Package maintainers

Dismissed
Permalink CVE-2026-25643
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • pkgsRocm.frigate
    • home-assistant-custom-components.frigate
  • @LeSuisse dismissed
Frigate Affected by Authenticated Remote Command Execution (RCE) and Container Escape

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.

Affected products

frigate
  • ==< 0.16.4

Matching in nixpkgs

Package maintainers

Not a security issue in NixOS context: https://github.com/NixOS/nixpkgs/pull/485427#issuecomment-3825303116