Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-3976
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    35 packages
    • gaw
    • w3m
    • Xaw3d
    • pw3270
    • revpfw3
    • w3m-nox
    • libxaw3d
    • w3m-full
    • sparrow3d
    • w3m-batch
    • libgtkflow3
    • w3m-nographics
    • python312Packages.w3lib
    • python313Packages.w3lib
    • python314Packages.w3lib
    • tests.fetchzip.postFetch
    • perlPackages.W3CLinkChecker
    • perl5Packages.W3CLinkChecker
    • tests.fetchurl.hashedMirrors
    • tests.fetchgit.sparseCheckout
    • perl538Packages.W3CLinkChecker
    • perl540Packages.W3CLinkChecker
    • tests.fetchFromGitHub.leave-git
    • perlPackages.DateTimeFormatW3CDTF
    • ocamlPackages.lablgtk3-sourceview3
    • perl5Packages.DateTimeFormatW3CDTF
    • chickenPackages_5.chickenEggs.glfw3
    • perl538Packages.DateTimeFormatW3CDTF
    • perl540Packages.DateTimeFormatW3CDTF
    • perlPackages.WebServiceValidatorHTMLW3C
    • perl5Packages.WebServiceValidatorHTMLW3C
    • ocamlPackages_latest.lablgtk3-sourceview3
    • perl538Packages.WebServiceValidatorHTMLW3C
    • perl540Packages.WebServiceValidatorHTMLW3C
    • haskellPackages.hs-opentelemetry-propagator-w3c
  • @LeSuisse dismissed
Tenda W3 POST Parameter WifiMacFilterSet formWifiMacFilterSet stack-based overflow

A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

Affected products

W3
  • ==1.0.0.3(2204)
Ignored packages (35)
Not present in nixpkgs
Permalink CVE-2026-4042
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • xf86videoi128
    • xf86-video-i128
    • vscode-extensions.tomoki1207.pdf
  • @LeSuisse dismissed
Tenda i12 WifiMacFilterGet formWifiMacFilterGet stack-based overflow

A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. This manipulation of the argument index causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

Affected products

i12
  • ==1.0.0.6(2204)
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-4041
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • xf86videoi128
    • xf86-video-i128
    • vscode-extensions.tomoki1207.pdf
  • @LeSuisse dismissed
Tenda i12 exeCommand vos_strcpy stack-based overflow

A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the function vos_strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

Affected products

i12
  • ==1.0.0.6(2204)
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-28512
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
Pocket ID: OAuth redirect_uri validation bypass via userinfo/host confusion

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. From 2.0.0 to before 2.4.0, a flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host. This vulnerability is fixed in 2.4.0.

Affected products

pocket-id
  • ==>= 2.0.0, < 2.4.0

Matching in nixpkgs

Package maintainers

Unstable: https://github.com/NixOS/nixpkgs/pull/497928
25.11: Unaffected
Permalink CVE-2026-3588
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    4 packages
    • python312Packages.dirigera
    • python313Packages.dirigera
    • python314Packages.dirigera
    • home-assistant-custom-components.dirigera_platform
  • @mweinelt dismissed
Server-Side Request Forgery (SSRF) in ikea dirigera

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

Affected products

dirigera
  • =<2.866.4
Ignored packages (4)
Not in nixpkgs
Permalink CVE-2026-29023
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package haskellPackages.shannon-fano
  • @mweinelt dismissed
Keygraph Shannon Hard-coded Router API Key

Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key. An attacker able to reach the router port can proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, resulting in unauthorized API usage and potential disclosure of proxied request and response data. This vulnerability's general exploitability has been mitigated with the introduction of commit 023cc95.

Affected products

Shannon
  • <commit 023cc95
Ignored packages (1)
Not in nixpkgs
Permalink CVE-2025-15603
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
open-webui JWT Key start_windows.bat random values

A security vulnerability has been detected in open-webui up to 0.6.16. Affected is an unknown function of the file backend/start_windows.bat of the component JWT Key Handler. Such manipulation of the argument WEBUI_SECRET_KEY leads to insufficiently random values. It is possible to launch the attack remotely. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit has been disclosed publicly and may be used.

Affected products

open-webui
  • ==0.6.1
  • ==0.6.15
  • ==0.6.5
  • ==0.6.10
  • ==0.6.0
  • ==0.6.2
  • ==0.6.6
  • ==0.6.16
  • ==0.6.4
  • ==0.6.7
  • ==0.6.14
  • ==0.6.11
  • ==0.6.13
  • ==0.6.3
  • ==0.6.9
  • ==0.6.8
  • ==0.6.12

Matching in nixpkgs

Package maintainers

0.6.x is older than everything we have
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • python312Packages.azure-mgmt-commerce
    • python313Packages.azure-mgmt-commerce
    • python314Packages.azure-mgmt-commerce
    • python312Packages.mypy-boto3-marketplacecommerceanalytics
    • python313Packages.mypy-boto3-marketplacecommerceanalytics
    • python314Packages.mypy-boto3-marketplacecommerceanalytics
    • python312Packages.types-aiobotocore-marketplacecommerceanalytics
    • python313Packages.types-aiobotocore-marketplacecommerceanalytics
  • @mweinelt dismissed
Craft Commerce has a SQL Injection in Commerce Purchasables Table Sorting

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, Craft Commerce is vulnerable to SQL Injection in the purchasables table endpoint. The sort parameter is split by | and the first part (column name) is passed directly as an array key to orderBy() without whitelist validation. Yii2's query builder does NOT escape array keys, allowing an authenticated attacker to inject arbitrary SQL into the ORDER BY clause. This vulnerability is fixed in 4.10.2 and 5.5.3.

Affected products

commerce
  • ==>= 4.0.0 < 4.10.2
  • ==>= 5.0.0 < 5.5.3
Ignored packages (8)
Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • python312Packages.azure-mgmt-commerce
    • python313Packages.azure-mgmt-commerce
    • python314Packages.azure-mgmt-commerce
    • python312Packages.mypy-boto3-marketplacecommerceanalytics
    • python313Packages.mypy-boto3-marketplacecommerceanalytics
    • python314Packages.mypy-boto3-marketplacecommerceanalytics
    • python312Packages.types-aiobotocore-marketplacecommerceanalytics
    • python313Packages.types-aiobotocore-marketplacecommerceanalytics
  • @mweinelt dismissed
Craft Commerce has a SQL Injection in Commerce Inventory Table Sorting

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, Craft Commerce is vulnerable to SQL Injection in the inventory levels table data endpoint. The sort[0][direction] and sort[0][sortField] parameters are concatenated directly into an addOrderBy() clause without any validation or sanitization. An authenticated attacker with access to the Commerce Inventory section can inject arbitrary SQL queries, potentially leading to a full database compromise. This vulnerability is fixed in 5.5.3.

Affected products

commerce
  • ==>= 5.0.0 < 5.5.3
Ignored packages (8)
Not in nixpkgs
Permalink CVE-2026-30974
4.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
Copyparty volflag `nohtml` did not block javascript in svg files

Copyparty is a portable file server. Prior to v1.20.11., the nohtml config option, intended to prevent execution of JavaScript in user-uploaded HTML files, did not apply to SVG images. A user with write-permission could upload an SVG containing embedded JavaScript, which would execute in the context of whichever user opens it. This has been fixed in v1.20.11.

Affected products

copyparty
  • ==< 1.20.11

Matching in nixpkgs

Package maintainers

https://github.com/NixOS/nixpkgs/pull/498063
https://github.com/NixOS/nixpkgs/pull/498654