Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-27792
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • overseerr
    • jellyseerr
    • python312Packages.python-overseerr
    • python313Packages.python-overseerr
    • python314Packages.python-overseerr
    • home-assistant-component-tests.overseerr
    • tests.home-assistant-component-tests.overseerr
  • @LeSuisse dismissed
Seerr missing authentication on pushSubscription endpoints

Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. A missing authorization vulnerability has been identified in the application starting in version 2.7.0 and prior to version 3.1.0. It allows authenticated users to access and modify data belonging to other users. This issue is due to the absence of the `isOwnProfileOrAdmin()` middleware on several push subscription API routes. Version 3.1.0 fixes the issue.

Affected products

seerr
  • ==>= 2.7.0, < 3.1.0
Ignored packages (7)
Not present in nixpkgs
Permalink CVE-2026-28409
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed
    4 packages
    • perlPackages.SnowballNorwegian
    • perl5Packages.SnowballNorwegian
    • perl538Packages.SnowballNorwegian
    • perl540Packages.SnowballNorwegian
  • @anthonyroussel dismissed
WeGIA Vulnerable to Remote Code Execution (RCE) via OS Command Injection

WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, a critical Remote Code Execution (RCE) vulnerability exists in the WeGIA application's database restoration functionality. An attacker with administrative access (which can be obtained via the previously reported Authentication Bypass) can execute arbitrary OS commands on the server by uploading a backup file with a specifically crafted filename. Version 3.6.5 fixes the issue.

Affected products

WeGIA
  • ==< 3.6.5
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2026-3285
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed
    21 packages
    • berry
    • amiberry
    • blueberry
    • strawberry
    • yarn-berry
    • yarn-berry_3
    • yarn-berry_4
    • raspberrypifw
    • libraspberrypi
    • strawberry-qt6
    • device-tree_rpi
    • raspberrypi-eeprom
    • raspberrypi-armstubs
    • haskellPackages.huckleberry
    • raspberrypiWirelessFirmware
    • python312Packages.strawberry-django
    • python313Packages.strawberry-django
    • python312Packages.strawberry-graphql
    • python313Packages.strawberry-graphql
    • home-assistant-component-tests.raspberry_pi
    • tests.home-assistant-component-tests.raspberry_pi
  • @anthonyroussel dismissed
berry-lang berry be_lexer.c scan_string out-of-bounds

A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.

Affected products

berry
  • ==1.1.0
  • ==1.0
Ignored packages (21)
Not present in nixpkgs (berry-lang)
Permalink CVE-2025-9572
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed
    6 packages
    • wyoming-satellite
    • xwayland-satellite
    • home-assistant-component-tests.assist_satellite
    • tests.home-assistant-component-tests.assist_satellite
    • foreman
    • satellite
  • @anthonyroussel dismissed
Foreman: satellite: graphql api permission bypass leads to information disclosure

n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass.

References

Affected products

foreman
  • *
  • <3.16.2
satellite
  • *
rubygem-katello
  • *
Ignored packages (6)
Not present in nixpkgs
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed package haskellPackages.Mantissa
  • @anthonyroussel dismissed
An access control issue in MantisBT before 1.2.13 allows users …

An access control issue in MantisBT before 1.2.13 allows users with "Reporter" permissions to change any issue to "New".

References

Affected products

mantis
  • ==1.2.13
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2026-26985
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed package florist
  • @anthonyroussel dismissed
LORIS vulnerable to path traversal in electrophysiology_browser

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Starting in version 24.0.0 and prior to versions 26.0.5, 27.0.2, and 28.0.0, an authenticated user with the appropriate authorization can read configuration files on the server by exploiting a path traversal vulnerability. Some of these files contain hard-coded credentials. The vulnerability allows an attacker to read configuration files containing hard-coded credentials. The attacker could then authenticate to the database or other services if those credentials are reused. The attacker must be authenticated and have the required permissions. However, the vulnerability is easy to exploit and the application source code is public. This problem is fixed in LORIS v26.0.5 and v27.0.2 and above, and v28.0.0 and above. As a workaround, the electrophysiogy_browser in LORIS can be disabled by an administrator using the module manager.

Affected products

Loris
  • ==>= 24.0.0, < 26.0.5
  • ==>= 27.0.0, < 27.0.2
Ignored packages (1)

pkgs.florist

Posix Ada Bindings

  • nixos-unstable 24.2
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
Not present in nixpkgs
Permalink CVE-2026-28408
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed
    4 packages
    • perl540Packages.SnowballNorwegian
    • perl538Packages.SnowballNorwegian
    • perlPackages.SnowballNorwegian
    • perl5Packages.SnowballNorwegian
  • @anthonyroussel dismissed
WeGIA lacks authentication verification in adicionar_tipo_docs_atendido.php

WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, the script in adicionar_tipo_docs_atendido.php does not go through the project's central controller and does not have its own authentication and permission checks. A malicious user could make a request through tools like Postman or the file's URL on the web to access features exclusive to employees. The vulnerability allows external parties to inject unauthorized data in massive quantities into the application server's storage. Version 3.6.5 fixes the issue.

Affected products

WeGIA
  • ==< 3.6.5
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2026-1442
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel removed
    3 packages
    • typstPackages.flupke-headstamp_0_1_0
    • typstPackages.flupke-headstamp
    • dotnetCorePackages.patchNupkgs
  • @anthonyroussel dismissed
Unitree UPK files Hard-Coded Key

Since the encryption algorithm used to protect firmware updates is itself encrypted using key material available to an attacker (or anyone paying attention), the firmware updates may be altered by an unauthorized user, and then trusted by a Unitree product, such as the Unitree Go2 and other models. This issue appears to affect all of Unitree’s current offerings as of February 26, 2026, and so should be considered a vulnerability in both the firmware generation and extraction processes. At the time of this release, there is no publicly-documented mechanism to subvert the update process and insert poisoned firmware packages without the equipment owner’s knowledge.

Affected products

UPK
  • =<20260226v1
Ignored packages (3)
Not present in nixpkgs
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Dify has a user enumeration issue

Dify is an open-source LLM app development platform. Prior to 1.9.0, responses from the Dify API to existing and non-existent accounts differ, allowing an attacker to enumerate email addresses registered with Dify. Version 1.9.0 fixes the issue.

Affected products

dify
  • ==< 1.9.0

Matching in nixpkgs

pkgs.hiddify-app

Multi-platform auto-proxy client, supporting Sing-box, X-ray, TUIC, Hysteria, Reality, Trojan, SSH etc

Package maintainers

dify not in nixpkgs
Permalink CVE-2026-28411
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
WeGIA Vulnerable to Authentication Bypass via `extract($_REQUEST)`

WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, an unsafe use of the `extract()` function on the `$_REQUEST` superglobal allows an unauthenticated attacker to overwrite local variables in multiple PHP scripts. This vulnerability can be leveraged to completely bypass authentication checks, allowing unauthorized access to administrative and protected areas of the WeGIA application. Version 3.6.5 fixes the issue.

Affected products

WeGIA
  • ==< 3.6.5

Matching in nixpkgs

WeGIA not in nixpkgs