Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-3973
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    35 packages
    • gaw
    • w3m
    • Xaw3d
    • pw3270
    • revpfw3
    • w3m-nox
    • libxaw3d
    • w3m-full
    • sparrow3d
    • w3m-batch
    • libgtkflow3
    • w3m-nographics
    • python312Packages.w3lib
    • python313Packages.w3lib
    • python314Packages.w3lib
    • tests.fetchzip.postFetch
    • perlPackages.W3CLinkChecker
    • perl5Packages.W3CLinkChecker
    • tests.fetchurl.hashedMirrors
    • tests.fetchgit.sparseCheckout
    • perl538Packages.W3CLinkChecker
    • perl540Packages.W3CLinkChecker
    • tests.fetchFromGitHub.leave-git
    • perlPackages.DateTimeFormatW3CDTF
    • ocamlPackages.lablgtk3-sourceview3
    • perl5Packages.DateTimeFormatW3CDTF
    • chickenPackages_5.chickenEggs.glfw3
    • perl538Packages.DateTimeFormatW3CDTF
    • perl540Packages.DateTimeFormatW3CDTF
    • perlPackages.WebServiceValidatorHTMLW3C
    • perl5Packages.WebServiceValidatorHTMLW3C
    • ocamlPackages_latest.lablgtk3-sourceview3
    • perl538Packages.WebServiceValidatorHTMLW3C
    • perl540Packages.WebServiceValidatorHTMLW3C
    • haskellPackages.hs-opentelemetry-propagator-w3c
  • @LeSuisse dismissed
Tenda W3 POST Parameter setAutoPing formSetAutoPing stack-based overflow

A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parameter Handler. This manipulation of the argument ping1/ping2 causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

Affected products

W3
  • ==1.0.0.3(2204)
Ignored packages (35)
Not present in nixpkgs
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • lxd-ui
    • lxd-lts
    • lxd-image-server
    • lxd-unwrapped-lts
    • python312Packages.pylxd
    • python313Packages.pylxd
    • python314Packages.pylxd
    • terraform-providers.lxd
    • terraform-providers.terraform-lxd_lxd
  • @LeSuisse dismissed
Authenticated RCE via unsanitized compression_algorithm

An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.

Affected products

lxd
  • <5.0.6
  • <6.7
  • <5.21.4
  • ==4.12
Ignored packages (9)

pkgs.lxd-ui

Web user interface for LXD

pkgs.lxd-lts

Daemon based on liblxc offering a REST API to manage containers

pkgs.lxd-unwrapped-lts

Daemon based on liblxc offering a REST API to manage containers

Not present in nixpkgs
Permalink CVE-2026-32442
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package haskellPackages.line2pdf
  • @LeSuisse dismissed
WordPress e2pdf plugin <= 1.28.15 - Broken Access Control vulnerability

Missing Authorization vulnerability in E2Pdf e2pdf e2pdf allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects e2pdf: from n/a through <= 1.28.15.

Affected products

e2pdf
  • =<<= 1.28.15
Ignored packages (1)
Not present in nixpkgs
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • python312Packages.vertica-python
    • python313Packages.vertica-python
    • python314Packages.vertica-python
    • gnomeExtensions.vertical-app-grid
    • gnomeExtensions.vertical-workspaces
    • gnomeExtensions.vertical-window-list
    • obs-studio-plugins.obs-vertical-canvas
    • kakounePlugins.kakoune-vertical-selection
  • @LeSuisse dismissed
Improper neutralization of input during web page generation vulnerability has been discovered in OpenText™ Vertica.

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in OpenText™ Vertica allows Reflected XSS.  The vulnerability could lead to Reflected XSS attack of cross-site scripting in Vertica management console application.This issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X, from 25.1.0 through 25.1.X, from 25.2.0 through 25.2.X, from 25.3.0 through 25.3.X.

Affected products

Vertica
  • =<11.x
  • =<25.1.x
  • =<24.x
  • =<23.x
  • =<25.2.x
  • =<10.x
  • =<12.x
  • =<25.3.x
Ignored packages (8)

pkgs.gnomeExtensions.vertical-workspaces

V-Shell is designed to enhance and customize the user experience by providing flexible workspace orientations and a variety of interface adjustments, including application grid customization and productivity improvements.

Not present in nixpkgs
Permalink CVE-2026-32458
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    20 packages
    • ecwolf
    • wolfssl
    • direwolf
    • wolfebin
    • wolf-shaper
    • wolfram-engine
    • wolfram-notebook
    • wolfstoneextract
    • direwolf-unstable
    • pkgsRocm.librewolf
    • librewolf-unwrapped
    • python312Packages.aardwolf
    • python313Packages.aardwolf
    • python314Packages.aardwolf
    • python312Packages.wolf-comm
    • python313Packages.wolf-comm
    • python314Packages.wolf-comm
    • pkgsRocm.librewolf-unwrapped
    • home-assistant-component-tests.wolflink
    • tests.home-assistant-component-tests.wolflink
  • @LeSuisse dismissed
WordPress WOLF plugin <= 1.0.8.7 - SQL Injection vulnerability

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 WOLF bulk-editor allows Blind SQL Injection.This issue affects WOLF: from n/a through <= 1.0.8.7.

Affected products

bulk-editor
  • =<<= 1.0.8.7
Ignored packages (20)

pkgs.wolfram-notebook

None

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
Not present in nixpkgs
Permalink CVE-2026-32616
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • dovecot_pigeonhole
    • gnomeExtensions.pigeon-email-notifier
    • chickenPackages_5.chickenEggs.pigeon-hole
    • pigeon
  • @LeSuisse dismissed
Pigeon has a Host Header Injection in email verification flow

Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host header in the HTTP request, causing the verification link sent to the user's email to point to an attacker-controlled domain. This can lead to account takeover by stealing the email verification token. This vulnerability is fixed in 1.0.201.

Affected products

Pigeon
  • ==< 1.0.201
Ignored packages (4)
Not present in nixpkgs
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • monitoring-plugins
    • perlPackages.MonitoringPlugin
    • perl5Packages.MonitoringPlugin
    • haskellPackages.gogol-monitoring
    • perl538Packages.MonitoringPlugin
    • perl540Packages.MonitoringPlugin
    • python312Packages.google-cloud-monitoring
    • python313Packages.google-cloud-monitoring
    • python314Packages.google-cloud-monitoring
    • home-assistant-component-tests.victron_remote_monitoring
    • tests.home-assistant-component-tests.victron_remote_monitoring
  • @LeSuisse dismissed
Improper Access Control in github.com/ctfer-io/monitoring

The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). Prior to 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This vulnerability is fixed in 0.2.1.

Affected products

monitoring
  • ==< 0.2.1
Ignored packages (11)
Not present in nixpkgs
Permalink CVE-2026-32630
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • perlPackages.FileType
    • perl5Packages.FileType
    • perl538Packages.FileType
    • perl540Packages.FileType
  • @LeSuisse dismissed
file-type affected by ZIP Decompression Bomb DoS via [Content_Types].xml entry

file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2.

Affected products

file-type
  • ==>= 20.0.0, < 21.3.2
Ignored packages (4)
Not directly present in nixpkgs
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • python312Packages.vertica-python
    • python313Packages.vertica-python
    • python314Packages.vertica-python
    • gnomeExtensions.vertical-app-grid
    • gnomeExtensions.vertical-workspaces
    • gnomeExtensions.vertical-window-list
    • obs-studio-plugins.obs-vertical-canvas
    • kakounePlugins.kakoune-vertical-selection
  • @LeSuisse dismissed
Improper neutralization of input during web page generation vulnerability has been discovered in OpenText™ Vertica.

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in OpenText™ Vertica allows Reflected XSS.  The vulnerability could lead to Reflected XSS attack of cross-site scripting in Vertica management console application.This issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X, from 25.1.0 through 25.1.X.

Affected products

Vertica
  • =<11.x
  • =<25.1.x
  • =<24.x
  • =<23.x
  • =<10.x
  • =<12.x
Ignored packages (8)

pkgs.gnomeExtensions.vertical-workspaces

V-Shell is designed to enhance and customize the user experience by providing flexible workspace orientations and a variety of interface adjustments, including application grid customization and productivity improvements.

Not present in nixpkgs
Permalink CVE-2026-32600
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 6 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package xml-security-c
  • @LeSuisse dismissed
xml-security is Missing AES-GCM Authentication Tag Validation on Encrypted Nodes Allows for Unauthorized Decryption

xml-security is a library that implements XML signatures and encryption. Prior to 2.3.1, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 2.3.1.

Affected products

xml-security
  • ==< 2.3.1
Ignored packages (1)
Not present in nixpkgs