Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: skim

Found 1 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-41414
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week, 2 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 packages
    • skimpdf
    • vimPlugins.skim
    • nushell-plugin-skim
    • nushellPlugins.skim
  • @LeSuisse dismissed
Skim: Arbitrary code execution via pull_request_target fork checkout in pr.yml

Skim is a fuzzy finder designed to through files, lines, and commands. The generate-files job in .github/workflows/pr.yml checks out attacker-controlled fork code and executes it via cargo run, with access to SKIM_RS_BOT_PRIVATE_KEY and GITHUB_TOKEN (contents:write). No gates prevent exploitation - any GitHub user can trigger this by opening a pull request from a fork. This vulnerability is fixed with commit bf63404ad51985b00ed304690ba9d477860a5a75.

Affected products

skim
  • ==< bf63404ad51985b00ed304690ba9d477860a5a75

Matching in nixpkgs

pkgs.skim

Command-line fuzzy finder written in Rust

Ignored packages (4)

pkgs.skimpdf

PDF reader and note-taker for macOS

Package maintainers

Does not impact us directly (issue related to their own GHA)