Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-28484
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw 2026.2.15 - Option Injection in pre-commit Hook via Malicious Filenames

OpenClaw versions prior to 2026.2.15 contain an option injection vulnerability in the git-hooks/pre-commit hook that allows attackers to stage ignored files by creating maliciously-named files beginning with dashes. The hook fails to use a -- separator when piping filenames through xargs to git add, enabling attackers to inject git flags and add sensitive ignored files like .env to git history.

Affected products

OpenClaw
  • <2026.2.15

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.15 or older.
Permalink CVE-2026-22723
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    23 packages
    • rubyPackages.cf-uaac
    • rubyPackages.cf-uaa-lib
    • haskellPackages.quaalude
    • rubyPackages_3_1.cf-uaac
    • rubyPackages_3_2.cf-uaac
    • rubyPackages_3_3.cf-uaac
    • rubyPackages_3_4.cf-uaac
    • rubyPackages_4_0.cf-uaac
    • typstPackages.touying-buaa
    • rubyPackages_3_1.cf-uaa-lib
    • rubyPackages_3_2.cf-uaa-lib
    • rubyPackages_3_3.cf-uaa-lib
    • rubyPackages_3_4.cf-uaa-lib
    • rubyPackages_4_0.cf-uaa-lib
    • typstPackages.modern-buaa-thesis
    • typstPackages.touying-buaa_0_1_0
    • typstPackages.touying-buaa_0_2_0
    • typstPackages.buaa-unofficial-gradient
    • typstPackages.modern-buaa-thesis_0_1_0
    • typstPackages.modern-buaa-thesis_0_1_1
    • typstPackages.modern-buaa-thesis_0_1_2
    • typstPackages.modern-buaa-thesis_0_2_0
    • typstPackages.buaa-unofficial-gradient_0_1_0
  • @mweinelt dismissed
UAA User Token Revocation logic error

Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.

Affected products

UAA
  • =<v78.7.0
Ignored packages (23)
Not in nixpkgs
Permalink CVE-2026-29609
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by serving oversized responses without content-length headers to cause availability loss.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    4 packages
    • python312Packages.apollo-fpga
    • python313Packages.apollo-fpga
    • python314Packages.apollo-fpga
    • vscode-extensions.apollographql.vscode-apollo
  • @mweinelt dismissed
WordPress Apollo | Night Club, DJ Event WordPress Theme theme <= 1.3.1 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Apollo | Night Club, DJ Event WordPress Theme apollo allows PHP Local File Inclusion.This issue affects Apollo | Night Club, DJ Event WordPress Theme: from n/a through <= 1.3.1.

Affected products

apollo
  • =<<= 1.3.1
Ignored packages (4)
Not in nixpkgs
Permalink CVE-2026-28391
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement

OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.

Affected products

OpenClaw
  • <2026.2.2

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.2 or older.
Permalink CVE-2026-28473
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls.

Affected products

OpenClaw
  • <2026.2.2

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.2 or older.
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package stargazer
  • @mweinelt dismissed
WordPress Stargaze theme <= 1.5 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Stargaze stargaze allows PHP Local File Inclusion.This issue affects Stargaze: from n/a through <= 1.5.

Affected products

stargaze
  • =<<= 1.5
Ignored packages (1)
Not in nixpkgs
Permalink CVE-2026-28451
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching

OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation or prompt injection to trigger requests to internal services and re-upload responses as Feishu media.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Permalink CVE-2026-28459
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path

OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.

Affected products

OpenClaw
  • <2026.2.12

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.12 or older.
Permalink CVE-2026-28475
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison

OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.

Affected products

OpenClaw
  • <2026.2.13

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.13 or older.