Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-15569
7.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    10 packages
    • python312Packages.pymupdf
    • python313Packages.pymupdf
    • python314Packages.pymupdf
    • python312Packages.pymupdf4llm
    • python313Packages.pymupdf4llm
    • python314Packages.pymupdf4llm
    • zathuraPkgs.zathura_pdf_mupdf
    • python312Packages.pymupdf-fonts
    • python313Packages.pymupdf-fonts
    • python314Packages.pymupdf-fonts
  • @LeSuisse dismissed
Artifex MuPDF win_main.c get_system_dpi uncontrolled search path

A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted element is the function get_system_dpi of the file platform/x11/win_main.c. This manipulation causes uncontrolled search path. The attack requires local access. The attack is considered to have high complexity. The exploitability is regarded as difficult. Upgrading to version 1.26.2 is sufficient to resolve this issue. Patch name: ebb125334eb007d64e579204af3c264aadf2e244. Upgrading the affected component is recommended.

Affected products

MuPDF
  • ==1.26.2
  • ==1.26.1
  • ==1.26.0

Matching in nixpkgs

Package maintainers

Windows only issue.
Permalink CVE-2026-25956
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • nixos-artwork.wallpapers.catppuccin-frappe
    • nixos-artwork.wallpapers.nineish-catppuccin-frappe
    • nixos-artwork.wallpapers.nineish-catppuccin-frappe-alt
  • @LeSuisse dismissed
Frappe Affected by XSS and Open Redirect in Sign Up

Frappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could craft a malicious signup URL for a frappe site which could lead to an open redirect (or reflected XSS, depending on the crafted payload) when a user signs up. This vulnerability is fixed in 14.99.14 and 15.94.0.

Affected products

frappe
  • ==< 14.99.14
  • ==>= 15.0.0, < 15.94.0
Not present in nixpkgs
Permalink CVE-2025-64487
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    15 packages
    • go-outline
    • mdbook-pdf-outline
    • python312Packages.outlines
    • typstPackages.suboutline_0_1_0
    • typstPackages.suboutline_0_2_0
    • python313Packages.outlines
    • typstPackages.suboutline_0_3_0
    • mplus-outline-fonts.osdnRelease
    • python312Packages.outlines-core
    • python313Packages.outlines-core
    • python314Packages.outlines-core
    • mplus-outline-fonts.githubRelease
    • pkgsRocm.python3Packages.outlines
    • typstPackages.outline-summaryst_0_1_0
    • pkgsRocm.python3Packages.outlines-core
  • @LeSuisse dismissed
Outline is vulnerable to privilege escalation vulnerability in document sharing

Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a privilege escalation vulnerability exists in the Outline document management system due to inconsistent authorization checks between user and group membership management endpoints. This vulnerability is fixed in 1.1.0.

Affected products

outline
  • ==<= 1.0.1

Matching in nixpkgs

pkgs.outline

Fastest wiki and knowledge base for growing teams. Beautiful, feature rich, and markdown compatible

Package maintainers

Current stable was never impacted

https://github.com/NixOS/nixpkgs/commit/b70998bdd58763d21cc7c31265b8c7cdd069d29f
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.pan-os-python
    • python313Packages.pan-os-python
    • python314Packages.pan-os-python
  • @LeSuisse dismissed
PAN-OS: Denial of Service in Advanced DNS Security Feature

A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW and Prisma Access® are not impacted by this vulnerability.

Affected products

PAN-OS
  • <11.1.11
  • <12.1.4
  • <11.2.10
  • <10.2.17
Cloud NGFW
  • ==All
Prisma Access
  • <10.2.10-h28
Not present in nixpkgs.
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    24 packages
    • lms
    • flmsg
    • helmsman
    • lmstudio
    • python312Packages.calmsize
    • python313Packages.calmsize
    • python314Packages.calmsize
    • python312Packages.dlms-cosem
    • python313Packages.dlms-cosem
    • python314Packages.dlms-cosem
    • python313Packages.llm-lmstudio
    • python314Packages.llm-lmstudio
    • python312Packages.llama-index-llms-ollama
    • python312Packages.llama-index-llms-openai
    • python313Packages.llama-index-llms-ollama
    • python313Packages.llama-index-llms-openai
    • python312Packages.llama-index-llms-openai-like
    • python313Packages.llama-index-llms-openai-like
    • pkgsRocm.python3Packages.llama-index-llms-ollama
    • pkgsRocm.python3Packages.llama-index-llms-openai
    • pkgsRocm.python3Packages.llama-index-llms-openai-like
    • python312Packages.llama-index-multi-modal-llms-openai
    • python313Packages.llama-index-multi-modal-llms-openai
    • pkgsRocm.python3Packages.llama-index-multi-modal-llms-openai
  • @LeSuisse dismissed
Frappe LMS affected by unauthorised user was able to access the full list of batch enrolled students

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.44.0, security issue was identified in Frappe Learning, where unauthorised users were able to access the full list of enrolled students (by email) in batches. This vulnerability is fixed in 2.44.0.

Affected products

lms
  • ==< 2.44.0
Not present in nixpkgs
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • speedify
    • hiddify-app
    • gomodifytags
    • haskellPackages.swizzle-modify
  • @LeSuisse dismissed
Client‑side DOM XSS in the web chat app of Dify when using echarts

Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulnerability has been found in the web application chat frontend when using echarts. User or llm inputs containing echarts containing a specific javascript payload will be executed. This vulnerability is fixed in 1.13.0.

Affected products

dify
  • ==< 1.13.0
Not present in nixpkgs
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    15 packages
    • python313Packages.outlines
    • typstPackages.suboutline_0_1_0
    • typstPackages.suboutline_0_2_0
    • typstPackages.suboutline_0_3_0
    • mplus-outline-fonts.osdnRelease
    • python312Packages.outlines-core
    • python313Packages.outlines-core
    • python314Packages.outlines-core
    • mplus-outline-fonts.githubRelease
    • pkgsRocm.python3Packages.outlines
    • python312Packages.outlines
    • typstPackages.outline-summaryst_0_1_0
    • mdbook-pdf-outline
    • pkgsRocm.python3Packages.outlines-core
    • go-outline
  • @LeSuisse dismissed
Outline has a suspended user authentication bypass via WebSocket connections

Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a vulnerability was found in Outline's WebSocket authentication mechanism that allows suspended users to maintain or establish real-time WebSocket connections and continue receiving sensitive operational updates after their account has been suspended. This vulnerability is fixed in 1.1.0.

Affected products

outline
  • ==< 1.1.0

Matching in nixpkgs

pkgs.outline

Fastest wiki and knowledge base for growing teams. Beautiful, feature rich, and markdown compatible

Package maintainers

Current stable branch was never impacted https://github.com/NixOS/nixpkgs/commit/b70998bdd58763d21cc7c31265b8c7cdd069d29f
Permalink CVE-2026-26190
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • python312Packages.pymilvus
    • python313Packages.pymilvus
    • python314Packages.pymilvus
    • python312Packages.llama-index-vector-stores-milvus
    • python313Packages.llama-index-vector-stores-milvus
    • pkgsRocm.python3Packages.llama-index-vector-stores-milvus
  • @LeSuisse dismissed
Milvus Allows Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.

Affected products

milvus
  • ==>= 2.6.0, < 2.6.10
  • ==< 2.5.27
Not present in nixpkgs.
Permalink CVE-2025-54914
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • s6-networking
    • glib-networking
    • networking-ts-cxx
    • gamenetworkingsockets
    • s6-networking-man-pages
    • skawarePackages.s6-networking
    • haskellPackages.gogol-servicenetworking
    • skawarePackages.s6-networking-man-pages
  • @LeSuisse dismissed
Azure Networking Elevation of Privilege Vulnerability

Azure Networking Elevation of Privilege Vulnerability

Affected products

Networking
  • ==-
  • ==N/A
SaaS service, not present in nixpkgs.
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    21 packages
    • ssh-agents
    • ocf-resource-agents
    • lima-additional-guestagents
    • python312Packages.smolagents
    • python313Packages.smolagents
    • python314Packages.smolagents
    • python312Packages.user-agents
    • python313Packages.user-agents
    • python314Packages.user-agents
    • python312Packages.pyuseragents
    • python313Packages.pyuseragents
    • python314Packages.pyuseragents
    • python312Packages.openai-agents
    • python313Packages.openai-agents
    • python314Packages.openai-agents
    • python312Packages.bot-safe-agents
    • python313Packages.azure-ai-agents
    • python313Packages.bot-safe-agents
    • python314Packages.azure-ai-agents
    • python314Packages.bot-safe-agents
    • pkgsRocm.python3Packages.smolagents
  • @LeSuisse dismissed
Reflected Cross-Site Scripting (XSS) vulnerability in AI Playground site

Summary A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's OAuth callback handler. The `error_description` query parameter was directly interpolated into an HTML script tag without proper escaping, allowing attackers to execute arbitrary JavaScript in the context of the victim's session. Root cause The OAuth callback handler in `site/ai-playground/src/server.ts` directly interpolated the `authError` value, sourced from the `error_description` query parameter, into an inline `<script>` tag. Impact An attacker could craft a malicious link that, when clicked by a victim, would: * Steal user chat message history - Access all LLM interactions stored in the user's session. * Access connected MCP Servers - Interact with any MCP servers connected to the victim's session (public or authenticated/private), potentially allowing the attacker to perform actions on the victim's behalf Mitigation: * PR:  https://github.com/cloudflare/agents/pull/841 https://github.com/cloudflare/agents/pull/841 * Agents-sdk users should upgrade to agents@0.3.10 * Developers using configureOAuthCallback with custom error handling in their own applications should ensure all user-controlled input is escaped before interpolation.

Affected products

agents
  • <0.3.10
Not present in nixpkgs