Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Dismissed
(exclusively hosted service)
Permalink CVE-2026-32191
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 days, 7 hours ago
Microsoft Bing Images Remote Code Execution Vulnerability

Improper neutralization of special elements used in an os command ('os command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

Affected products

Microsoft Bing Images
  • ==-
Permalink CVE-2026-3967
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 5 days, 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • libsForQt5.kactivities
    • plasma5Packages.kactivities
    • libsForQt5.kactivities-stats
    • kdePackages.plasma-activities
    • gnomeExtensions.auto-activities
    • gnomeExtensions.logo-activities
    • plasma5Packages.kactivities-stats
    • kdePackages.plasma-activities-stats
    • gnomeExtensions.hide-activities-button
    • gnomeExtensions.middle-click-activities
    • gnomeExtensions.double-click-activities-to-app-grid
  • @LeSuisse dismissed
Alfresco Activiti Process Variable Serialization System SerializableType.java createObjectInputStream deserialization

A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this issue is the function deserialize/createObjectInputStream of the file activiti-core/activiti-engine/src/main/java/org/activiti/engine/impl/variable/SerializableType.java of the component Process Variable Serialization System. This manipulation causes deserialization. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Activiti
  • ==7.16
  • ==7.2
  • ==7.7
  • ==7.8
  • ==8.0
  • ==8.2
  • ==7.0
  • ==7.6
  • ==7.15
  • ==7.10
  • ==7.4
  • ==7.18
  • ==7.11
  • ==8.5
  • ==7.17
  • ==7.1
  • ==7.9
  • ==7.14
  • ==7.5
  • ==8.6
  • ==7.19
  • ==8.7
  • ==8.8.0
  • ==7.3
  • ==8.1
  • ==7.12
  • ==7.13
  • ==8.3
  • ==8.4
Ignored packages (11)

pkgs.gnomeExtensions.hide-activities-button

Hides the Activities button from the status bar (the hot corner and keyboard shortcut keeps working). To disable top left hot corner use 'No Topleft Hot Corner' extension — https://extensions.gnome.org/extension/118/no-topleft-hot-corner/ .

  • nixos-unstable 22
    • nixpkgs-unstable 22
    • nixos-unstable-small 22
  • nixos-25.11 22
    • nixos-25.11-small 22
    • nixpkgs-25.11-darwin 22
Not present in nixpkgs
Permalink CVE-2026-32059
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec.safeBins

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.

Affected products

openclaw
  • <2026.2.23
  • ==2026.2.23

Matching in nixpkgs

Package maintainers

Initialized at 2026.2.26
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • nixos-artwork.wallpapers.catppuccin-frappe
    • nixos-artwork.wallpapers.nineish-catppuccin-frappe
    • nixos-artwork.wallpapers.nineish-catppuccin-frappe-alt
  • @LeSuisse dismissed
Frappe Workspace modification and stored XSS due to improper resource ownership checks

Frappe is a full-stack web application framework. Prior to 14.100.2, 15.101.0, and 16.10.0, due to a lack of validation and improper permission checks, users could modify other user's private workspaces. Specially crafted requests could lead to stored XSS here. This vulnerability is fixed in 14.100.2, 15.101.0, and 16.10.0.

Affected products

frappe
  • ==< 16.10.0
Ignored packages (3)
Not present
Permalink CVE-2026-32061
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
OpenClaw < 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal

OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directive resolution that allows reading arbitrary local files outside the config directory boundary. Attackers with config modification capabilities can exploit this by specifying absolute paths, traversal sequences, or symlinks to access sensitive files readable by the OpenClaw process user, including API keys and credentials.

Affected products

openclaw
  • <2026.2.17
  • ==2026.2.17

Matching in nixpkgs

Package maintainers

Initialized at 2026.2.26
Permalink CVE-2026-31878
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • nixos-artwork.wallpapers.catppuccin-frappe
    • nixos-artwork.wallpapers.nineish-catppuccin-frappe
    • nixos-artwork.wallpapers.nineish-catppuccin-frappe-alt
  • @LeSuisse dismissed
Frappe: Possible SSRF by any authenticated user

Frappe is a full-stack web application framework. Prior to 14.100.1, 15.100.0, and 16.6.0, a malicious user could send a crafted request to an endpoint which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 14.100.1, 15.100.0, and 16.6.0.

Affected products

frappe
  • ==>= 16.0.0, < 16.6.0
  • ==< 14.100.1
  • ==>= 15.0.0, < 15.100.0
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-3974
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    35 packages
    • gaw
    • w3m
    • Xaw3d
    • pw3270
    • revpfw3
    • w3m-nox
    • libxaw3d
    • w3m-full
    • sparrow3d
    • w3m-batch
    • libgtkflow3
    • w3m-nographics
    • python312Packages.w3lib
    • python313Packages.w3lib
    • python314Packages.w3lib
    • tests.fetchzip.postFetch
    • perlPackages.W3CLinkChecker
    • perl5Packages.W3CLinkChecker
    • tests.fetchurl.hashedMirrors
    • tests.fetchgit.sparseCheckout
    • perl538Packages.W3CLinkChecker
    • perl540Packages.W3CLinkChecker
    • tests.fetchFromGitHub.leave-git
    • perlPackages.DateTimeFormatW3CDTF
    • ocamlPackages.lablgtk3-sourceview3
    • perl5Packages.DateTimeFormatW3CDTF
    • chickenPackages_5.chickenEggs.glfw3
    • perl538Packages.DateTimeFormatW3CDTF
    • perl540Packages.DateTimeFormatW3CDTF
    • perlPackages.WebServiceValidatorHTMLW3C
    • perl5Packages.WebServiceValidatorHTMLW3C
    • ocamlPackages_latest.lablgtk3-sourceview3
    • perl538Packages.WebServiceValidatorHTMLW3C
    • perl540Packages.WebServiceValidatorHTMLW3C
    • haskellPackages.hs-opentelemetry-propagator-w3c
  • @LeSuisse dismissed
Tenda W3 HTTP exeCommand formexeCommand stack-based overflow

A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.

Affected products

W3
  • ==1.0.0.3(2204)
Ignored packages (35)
Not present in nixpkgs
Permalink CVE-2026-4043
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • xf86videoi128
    • xf86-video-i128
    • vscode-extensions.tomoki1207.pdf
  • @LeSuisse dismissed
Tenda i12 wifiSSIDget formwrlSSIDget stack-based overflow

A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Affected products

i12
  • ==1.0.0.6(2204)
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-4040
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
OpenClaw File Existence tools.exec.safeBins information exposure

A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects the function tools.exec.safeBins of the component File Existence Handler. The manipulation leads to information exposure through discrepancy. The attack needs to be performed locally. Upgrading to version 2026.2.19-beta.1 is capable of addressing this issue. The identifier of the patch is bafdbb6f112409a65decd3d4e7350fbd637c7754. Upgrading the affected component is advised.

Affected products

OpenClaw
  • ==2026.2.4
  • ==2026.2.15
  • ==2026.2.5
  • ==2026.2.1
  • ==2026.2.0
  • ==2026.2.10
  • ==2026.2.3
  • ==2026.2.14
  • ==2026.2.8
  • ==2026.2.17
  • ==2026.2.19-beta.1
  • ==2026.2.7
  • ==2026.2.11
  • ==2026.2.12
  • ==2026.2.2
  • ==2026.2.13
  • ==2026.2.9
  • ==2026.2.16
  • ==2026.2.6

Matching in nixpkgs

Package maintainers

Package was initialized at 2026.2.26
Permalink CVE-2026-3975
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 6 days, 17 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    35 packages
    • gaw
    • w3m
    • Xaw3d
    • pw3270
    • revpfw3
    • w3m-nox
    • libxaw3d
    • w3m-full
    • sparrow3d
    • w3m-batch
    • libgtkflow3
    • w3m-nographics
    • python312Packages.w3lib
    • python313Packages.w3lib
    • python314Packages.w3lib
    • tests.fetchzip.postFetch
    • perlPackages.W3CLinkChecker
    • perl5Packages.W3CLinkChecker
    • tests.fetchurl.hashedMirrors
    • tests.fetchgit.sparseCheckout
    • perl538Packages.W3CLinkChecker
    • perl540Packages.W3CLinkChecker
    • tests.fetchFromGitHub.leave-git
    • perlPackages.DateTimeFormatW3CDTF
    • ocamlPackages.lablgtk3-sourceview3
    • perl5Packages.DateTimeFormatW3CDTF
    • chickenPackages_5.chickenEggs.glfw3
    • perl538Packages.DateTimeFormatW3CDTF
    • perl540Packages.DateTimeFormatW3CDTF
    • perlPackages.WebServiceValidatorHTMLW3C
    • perl5Packages.WebServiceValidatorHTMLW3C
    • ocamlPackages_latest.lablgtk3-sourceview3
    • perl538Packages.WebServiceValidatorHTMLW3C
    • perl540Packages.WebServiceValidatorHTMLW3C
    • haskellPackages.hs-opentelemetry-propagator-w3c
  • @LeSuisse dismissed
Tenda W3 POST Parameter WifiMacFilterGet formWifiMacFilterGet stack-based overflow

A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component POST Parameter Handler. Performing a manipulation of the argument wl_radio results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

Affected products

W3
  • ==1.0.0.3(2204)
Ignored packages (35)
Not present in nixpkgs