Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-28395
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl

OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server to bind to all interfaces when a wildcard cdpUrl is configured. Remote attackers can access relay HTTP endpoints off-host to leak service presence and port information, or conduct denial-of-service and brute-force attacks against the relay token header.

Affected products

OpenClaw
  • <2026.2.12

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.12 or older.
Permalink CVE-2026-28392
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages

OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Permalink CVE-2026-28482
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters

OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.

Affected products

OpenClaw
  • <2026.2.12

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.12 or older.
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    9 packages
    • python313Packages.horizon-eda
    • python314Packages.horizon-eda
    • haskellPackages.horizontal-rule
    • haskellPackages.jpl-horizons-api
    • gnomeExtensions.status-area-horizontal-spacing
    • python312Packages.horizon-eda
    • omnissa-horizon-client
    • vmware-horizon-client
    • horizon-eda
  • @mweinelt dismissed
WordPress Horizon theme <= 1.1 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Horizon horizon allows PHP Local File Inclusion.This issue affects Horizon: from n/a through <= 1.1.

Affected products

horizon
  • =<<= 1.1
Ignored packages (9)
Not in nixpkgs
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    3 packages
    • vscode-extensions.marus25.cortex-debug
    • cortex-command-community-project
    • cortex-tools
  • @mweinelt dismissed
WordPress Cortex theme <= 1.5 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Cortex cortex allows PHP Local File Inclusion.This issue affects Cortex: from n/a through <= 1.5.

Affected products

cortex
  • =<<= 1.5
Ignored packages (3)
Not in nixpkgs
Permalink CVE-2026-3257
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package unqlite
  • @mweinelt dismissed
UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library

UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library. UnQLite for Perl embeds the UnQLite library. Version 0.06 and earlier of the Perl module uses a version of the library from 2014 that may be vulnerable to a heap-based overflow.

Affected products

UnQLite
  • =<0.06
Ignored packages (1)
Not in nixpkgs
Permalink CVE-2026-29610
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Permalink CVE-2026-29612
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding

OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Permalink CVE-2026-28474
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package nextcloud-talk-desktop
  • @mweinelt dismissed
OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing

OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.

Affected products

nextcloud-talk
  • <2026.2.6
Ignored packages (1)
Unaffected, never had 2026.2.6 or older.
Permalink CVE-2026-28457
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.