Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2023-49854
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • caddy
    • xcaddy
    • vimPlugins.nvim-treesitter-parsers.caddy
    • vscode-extensions.matthewpi.caddyfile-support
  • @LeSuisse dismissed
WordPress Caddy Plugin <= 1.9.7 is vulnerable to Cross Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) vulnerability in Tribe Interactive Caddy – Smart Side Cart for WooCommerce.This issue affects Caddy – Smart Side Cart for WooCommerce: from n/a through 1.9.7.

Affected products

caddy
  • =<1.9.7
Ignored packages (4)

pkgs.caddy

Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS

  • nixos-unstable -

pkgs.xcaddy

Build Caddy with plugins

  • nixos-unstable -
Not present in nixpkgs
Permalink CVE-2026-3052
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • rubyPackages.jekyll-theme-dinky
    • rubyPackages_3_1.jekyll-theme-dinky
    • rubyPackages_3_2.jekyll-theme-dinky
    • rubyPackages_3_3.jekyll-theme-dinky
    • rubyPackages_3_4.jekyll-theme-dinky
    • rubyPackages_4_0.jekyll-theme-dinky
  • @LeSuisse dismissed
DataLinkDC dinky Flink Proxy Controller FlinkProxyController.java proxyUba server-side request forgery

A vulnerability was found in DataLinkDC dinky up to 1.2.5. The impacted element is the function proxyUba of the file dinky-admin/src/main/java/org/dinky/controller/FlinkProxyController.java of the component Flink Proxy Controller. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

dinky
  • ==1.2.5
  • ==1.2.2
  • ==1.2.1
  • ==1.2.3
  • ==1.2.0
  • ==1.2.4
Ignored packages (6)
Not present in nixpkgs
Permalink CVE-2026-27483
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.mindsdb-evaluator
    • python313Packages.mindsdb-evaluator
    • python314Packages.mindsdb-evaluator
  • @LeSuisse dismissed
MindsDB has Path Traversal in /api/files Leading to Remote Code Execution

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. The vulnerability exists in the "Upload File" module, which corresponds to the API endpoint /api/files. Since the multipart file upload does not perform security checks on the uploaded file path, an attacker can perform path traversal by using `../` sequences in the filename field. The file write operation occurs before calling clear_filename and save_file, meaning there is no filtering of filenames or file types, allowing arbitrary content to be written to any path on the server. Version 25.9.1.1 patches the issue.

Affected products

mindsdb
  • ==< 25.9.1.1
Ignored packages (3)
Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • loudmouth
    • cloudmonkey
    • python312Packages.nextcloudmonitor
    • python313Packages.nextcloudmonitor
    • python314Packages.nextcloudmonitor
  • @LeSuisse dismissed
free5GC has Improper Input Validation in UDM, Leading to Information Exposure

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Affected products

udm
  • ==<= 1.4.1
Ignored packages (5)
Not present in nixpkgs
Permalink CVE-2026-3051
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • rubyPackages.jekyll-theme-dinky
    • rubyPackages_3_1.jekyll-theme-dinky
    • rubyPackages_3_2.jekyll-theme-dinky
    • rubyPackages_3_3.jekyll-theme-dinky
    • rubyPackages_3_4.jekyll-theme-dinky
    • rubyPackages_4_0.jekyll-theme-dinky
  • @LeSuisse dismissed
DataLinkDC dinky Project Name GitRepository.java getProjectDir path traversal

A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the argument projectName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

dinky
  • ==1.2.5
  • ==1.2.2
  • ==1.2.1
  • ==1.2.3
  • ==1.2.0
  • ==1.2.4
Ignored packages (6)
Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • smfh
    • asmfmt
    • libsmf
    • nasmfmt
    • mt32emu-smf2wav
    • python312Packages.pysmf
    • python313Packages.pysmf
    • python314Packages.pysmf
    • tests.fetchFromGitHub.rootDir
  • @LeSuisse dismissed
free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.USAR=1 and UsageReport omits mandatory URRID sub-IE 

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

Affected products

smf
  • ==<= 1.4.1
Ignored packages (9)

pkgs.libsmf

C library for reading and writing Standard MIDI Files

Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
An issue was discovered in in bwm-ng v0.6.2. An arbitrary …

An issue was discovered in in bwm-ng v0.6.2. An arbitrary null write exists in get_cmdln_options() function in src/options.c.

Affected products

bwm-ng
  • ==bwm-ng v0.6.2

Matching in nixpkgs

Current stable branch was never impacted.
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    10 packages
    • pscircle
    • libcircle
    • circle-flags
    • circleci-cli
    • pkgsRocm.libcircle
    • tela-circle-icon-theme
    • numix-icon-theme-circle
    • typstPackages.cross-circle
    • haskellPackages.circle-packing
    • typstPackages.cross-circle_1_0_0
  • @LeSuisse dismissed
Incorrect calculation in CIRCL secp384r1 CombinedMult

The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on this curve are not affected. The bug was fixed in v1.6.3 https://github.com/cloudflare/circl/releases/tag/v1.6.3 .

Affected products

CIRCL
  • <1.6.3
Ignored packages (10)

pkgs.libcircle

API for distributing embarrassingly parallel workloads using self-stabilization

Not directly present in nixpkgs
Permalink CVE-2026-28195
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.teamcity-messages
    • python313Packages.teamcity-messages
    • python314Packages.teamcity-messages
  • @LeSuisse dismissed
In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers …

In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations

Affected products

TeamCity
  • <2025.11.3
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-28196
2.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.teamcity-messages
    • python313Packages.teamcity-messages
    • python314Packages.teamcity-messages
  • @LeSuisse dismissed
In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a …

In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk

Affected products

TeamCity
  • <2025.11.3
Ignored packages (3)
Not present in nixpkgs