Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • spip
    • spiped
    • aespipe
    • lesspipe
  • @LeSuisse dismissed
SPIP < 4.4.10 Authentication Bypass via PHP Type Juggling

SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data.

Affected products

SPIP
  • <4.4.10
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2026-28207
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package frozen-containers
  • @LeSuisse dismissed
Zen-C Vulnerable to Command Injection via Malicious Output Filename

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.2, a command injection vulnerability (CWE-78) in the Zen C compiler allows local attackers to execute arbitrary shell commands by providing a specially crafted output filename via the `-o` command-line argument. The vulnerability existed in the `main` application logic (specifically in `src/main.c`), where the compiler constructed a shell command string to invoke the backend C compiler. This command string was built by concatenating various arguments, including the user-controlled output filename, and was subsequently executed using the `system()` function. Because `system()` invokes a shell to parse and execute the command, shell metacharacters within the output filename were interpreted by the shell, leading to arbitrary command execution. An attacker who can influence the command-line arguments passed to the `zc` compiler (like through a build script or a CI/CD pipeline configuration) can execute arbitrary commands with the privileges of the user running the compiler. The vulnerability has been fixed in version 0.4.2 by removing `system()` calls, implementing `ArgList`, and internal argument handling. Users are advised to update to Zen C version v0.4.2 or later.

Affected products

Zen-C
  • ==< 0.4.2
Ignored packages (1)
Not present in nixpkgs
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package google-app-engine-go-sdk
  • @LeSuisse dismissed
MCP Go SDK Vulnerable to Improper Handling of Case Sensitivity

The Go MCP SDK used Go's standard encoding/json.Unmarshal for JSON-RPC and MCP protocol message parsing in versions prior to 1.3.1. Go's standard library performs case-insensitive matching of JSON keys to struct field tags — a field tagged json:"method" would also match "Method", "METHOD", etc. This violated the JSON-RPC 2.0 specification, which defines exact field names. A malicious MCP peer may have been able to send protocol messages with non-standard field casing that the SDK would silently accept. This had the potential for bypassing intermediary inspection and coss-implementation inconsistency. Go's standard JSON unmarshaling was replaced with a case-sensitive decoder in commit 7b8d81c. Users are advised to update to v1.3.1 to resolve this issue.

Affected products

go-sdk
  • ==< 1.3.1
Ignored packages (1)
Not directly present in nixpkgs
Permalink CVE-2026-26932
5.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
Improper Validation of Array Index in Packetbeat Leading to Denial of Service

Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.

Affected products

Packetbeat
  • =<9.2.4
  • =<8.19.10

Matching in nixpkgs

Package maintainers

7.x is not impacted according to upstream advisory

https://discuss.elastic.co/t/packetbeat-8-19-11-9-2-5-security-update-esa-2026-10/385247
Permalink CVE-2026-27973
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • python312Packages.aioaudiobookshelf
    • python313Packages.aioaudiobookshelf
    • python314Packages.aioaudiobookshelf
    • pkgsRocm.audiobookshelf
  • @LeSuisse dismissed
Audiobookshelf has Stored XSS in ItemSearchCard.vue via Audiobook Metadata (Search Results on Mobile App)

Audiobookshelf is a self-hosted audiobook and podcast server. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 0.12.0-beta of the Audiobookshelf mobile application that allows arbitrary JavaScript execution through malicious library metadata. Attackers with library modification privileges can execute code in victim users' browsers/WebViews, potentially leading to session hijacking, data exfiltration, and unauthorized access to native device APIs. The issue is fixed in audiobookshelf-app version 0.12.0-beta, corresponding to audiobookshelf version 2.12.0.

Affected products

audiobookshelf
  • ==< 2.12.0
audiobookshelf-app
  • ==< 0.12.0-beta

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Current stable branch was never impacted
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • angular-language-server
    • nodePackages.@angular/cli
    • nodePackages_latest.@angular/cli
    • vscode-extensions.angular.ng-template
    • vimPlugins.nvim-treesitter-parsers.angular
  • @LeSuisse dismissed
Angular i18n vulnerable to Cross-Site Scripting (XSS)

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Versions prior to 21.2.0, 21.1.16, 20.3.17, and 19.2.19 have a cross-Site scripting vulnerability in the Angular internationalization (i18n) pipeline. In ICU messages (International Components for Unicode), HTML from translated content was not properly sanitized and could execute arbitrary JavaScript. Angular i18n typically involves three steps, extracting all messages from an application in the source language, sending the messages to be translated, and then merging their translations back into the final source code. Translations are frequently handled by contracts with specific partner companies, and involve sending the source messages to a separate contractor before receiving final translations for display to the end user. If the returned translations have malicious content, it could be rendered into the application and execute arbitrary JavaScript. When successfully exploited, this vulnerability allows for execution of attacker controlled JavaScript in the application origin. Depending on the nature of the application being exploited this could lead to credential exfiltration and/or page vandalism. Several preconditions apply to the attack. The attacker must compromise the translation file (xliff, xtb, etc.). Unlike most XSS vulnerabilities, this issue is not exploitable by arbitrary users. An attacker must first compromise an application's translation file before they can escalate privileges into the Angular application client. The victim application must use Angular i18n, use one or more ICU messages, render an ICU message, and not defend against XSS via a safe content security policy. Versions 21.2.0, 21.1.6, 20.3.17, and 19.2.19 patch the issue. Until the patch is applied, developers should consider reviewing and verifying translated content received from untrusted third parties before incorporating it in an Angular application, enabling strict CSP controls to block unauthorized JavaScript from executing on the page, and enabling Trusted Types to enforce proper HTML sanitization.

Affected products

angular
  • ==>= 21.2.0-next.0, < 21.2.0
  • ==<= 18.2.14
  • ==>= 19.0.0-next.0, < 19.2.19
  • ==>= 21.0.0-next.0, < 21.1.6
  • ==>= 20.0.0-next.0, < 20.3.17
Ignored packages (5)
Not directly present in nixpkgs
Permalink CVE-2025-52816
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • zitadel
    • zita-at1
    • zita-ajbridge
    • zita-njbridge
    • zitadel-tools
    • zita-alsa-pcmi
    • zita-convolver
    • zita-resampler
  • @LeSuisse dismissed
WordPress Zita theme <= 1.6.5 - Local File Inclusion Vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themehunk Zita allows PHP Local File Inclusion. This issue affects Zita: from n/a through 1.6.5.

Affected products

zita
  • =<1.6.5
Ignored packages (8)

pkgs.zitadel

Identity and access management platform

  • nixos-unstable -

pkgs.zita-at1

Autotuner Jack application to correct the pitch of vocal tracks

pkgs.zita-ajbridge

Connect additional ALSA devices to JACK

  • nixos-unstable -

pkgs.zita-njbridge

Command line Jack clients to transmit full quality multichannel audio over a local IP network

  • nixos-unstable -

pkgs.zita-alsa-pcmi

Successor of clalsadrv, provides easy access to ALSA PCM devices

  • nixos-unstable -
WP theme not present in nixpkgs
Permalink CVE-2026-22722
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    40 packages
    • helio-workstation
    • linuxPackages.vmware
    • linuxPackages_lqx.vmware
    • linuxPackages_zen.vmware
    • linuxPackages-libre.vmware
    • linuxPackages_latest.vmware
    • linuxPackages_xanmod.vmware
    • linuxPackages_hardened.vmware
    • linuxPackages_6_1_hardened.vmware
    • linuxPackages_6_6_hardened.vmware
    • linuxPackages_latest-libre.vmware
    • linuxPackages_5_10_hardened.vmware
    • linuxPackages_5_15_hardened.vmware
    • linuxPackages_xanmod_latest.vmware
    • linuxPackages_xanmod_stable.vmware
    • linuxKernel.packages.linux_5_4.vmware
    • linuxKernel.packages.linux_6_1.vmware
    • linuxKernel.packages.linux_6_6.vmware
    • linuxKernel.packages.linux_ham.vmware
    • linuxKernel.packages.linux_lqx.vmware
    • linuxKernel.packages.linux_zen.vmware
    • linuxKernel.packages.linux_5_10.vmware
    • linuxKernel.packages.linux_5_15.vmware
    • linuxKernel.packages.linux_6_12.vmware
    • linuxKernel.packages.linux_6_18.vmware
    • linuxKernel.packages.linux_6_19.vmware
    • linuxKernel.packages.linux_libre.vmware
    • linuxKernel.packages.linux_xanmod.vmware
    • linuxKernel.packages.linux_hardened.vmware
    • python312Packages.google-cloud-workstations
    • python313Packages.google-cloud-workstations
    • python314Packages.google-cloud-workstations
    • linuxKernel.packages.linux_6_1_hardened.vmware
    • linuxKernel.packages.linux_6_6_hardened.vmware
    • linuxKernel.packages.linux_latest_libre.vmware
    • linuxKernel.packages.linux_5_10_hardened.vmware
    • linuxKernel.packages.linux_5_15_hardened.vmware
    • linuxKernel.packages.linux_6_12_hardened.vmware
    • linuxKernel.packages.linux_xanmod_latest.vmware
    • linuxKernel.packages.linux_xanmod_stable.vmware
  • @LeSuisse dismissed
VMware Workstation for Windows null pointer dereference may allow an authenticated user to trigger a crash

A malicious actor with authenticated user privileges on a Windows based Workstation host may be able to cause a null pointer dereference error. To Remediate CVE-2026-22722, apply the patches listed in the "Fixed version" column of the 'Response Matrix'

Affected products

VMware Workstation
  • ==25H2u1
  • <25H2u1

Matching in nixpkgs

Ignored packages (40)

Package maintainers

Windows only
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    10 packages
    • svelte-check
    • svelte-language-server
    • nodePackages.svelte-check
    • nodePackages_latest.svelte-check
    • vscode-extensions.svelte.svelte-vscode
    • tree-sitter-grammars.tree-sitter-svelte
    • vimPlugins.nvim-treesitter-parsers.svelte
    • python312Packages.tree-sitter-grammars.tree-sitter-svelte
    • python313Packages.tree-sitter-grammars.tree-sitter-svelte
    • python314Packages.tree-sitter-grammars.tree-sitter-svelte
  • @LeSuisse dismissed
Svelte Vulnerable to XSS via HTML Comment Injection in SSR Error Boundary Hydration Markers

Svelte performance oriented web framework. Prior to version 5.53.5, errors from `transformError` were not correctly escaped prior to being embedded in the HTML output, causing potential HTML injection and XSS if attacker-controlled content is returned from `transformError`. Version 5.53.5 fixes the issue.

Affected products

svelte
  • ==>= 5.53.0, < 5.53.5
Ignored packages (10)
Not directly present in nixpkgs
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • spip
    • spiped
    • aespipe
    • lesspipe
  • @LeSuisse dismissed
SPIP < 4.4.10 SQL Injection RCE via Union & PHP Tags

SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL injection flaw combined with PHP tag processing to achieve remote code execution on the server.

Affected products

SPIP
  • <4.4.10
Ignored packages (4)
Not present in nixpkgs