Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-64517
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
sudo-rs doesn't record authenticating user properly in timestamp

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use their own password to run commands as root (the default behaviour of `sudo`), effectively negating the intended behaviour of the `targetpw` or `rootpw` options. Version 0.2.10 contains a patch for the issue. Versions prior to 0.2.5 are not affected, since they do not offer `Defaults targetpw` or `Defaults rootpw`.

Affected products

sudo-rs
  • ==>= 0.2.5, < 0.2.10

Matching in nixpkgs

Package maintainers

Current stable branch was never impacted.

https://github.com/NixOS/nixpkgs/commit/225394441f7dcade956f76bcd114fb4144602794
Permalink CVE-2026-25957
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    40 packages
    • cubeb
    • kmscube
    • pascube
    • musikcube
    • roundcube
    • classicube
    • metacubexd
    • assaultcube
    • stm32cubemx
    • gamecube-tools
    • hyperspeedcube
    • dockapps.wmcube
    • idrisPackages.cube
    • spacenav-cube-example
    • kdePackages.kjumpingcube
    • roundcubePlugins.carddav
    • gnomeExtensions.desktop-cube
    • phpExtensions.ioncube-loader
    • python312Packages.complycube
    • python313Packages.complycube
    • python314Packages.complycube
    • roundcubePlugins.contextmenu
    • roundcubePlugins.custom_from
    • haskellPackages.resistor-cube
    • python312Packages.maxcube-api
    • python313Packages.maxcube-api
    • python314Packages.maxcube-api
    • haskellPackages.marching-cubes
    • php81Extensions.ioncube-loader
    • php82Extensions.ioncube-loader
    • php83Extensions.ioncube-loader
    • php84Extensions.ioncube-loader
    • haskellPackages.marching-cubes2
    • python312Packages.spectral-cube
    • python313Packages.spectral-cube
    • python314Packages.spectral-cube
    • roundcubePlugins.persistent_login
    • roundcubePlugins.thunderbird_labels
    • home-assistant-component-tests.maxcube
    • tests.home-assistant-component-tests.maxcube
  • @LeSuisse dismissed
Cube Denial of Service (DoS) - An authenticated attacker can crash the server by sending a specially crafted request

Cube is a semantic layer for building data applications. From 1.1.17 to before 1.5.13 and 1.4.2, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. This vulnerability is fixed in 1.5.13 and 1.4.2.

Affected products

cube
  • ==>= 1.1.17, < 1.4.2
  • ==>= 1.5.0, < 1.5.13
Not present in nixpkgs
Permalink CVE-2026-25958
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    40 packages
    • cubeb
    • kmscube
    • pascube
    • musikcube
    • roundcube
    • classicube
    • metacubexd
    • assaultcube
    • stm32cubemx
    • gamecube-tools
    • hyperspeedcube
    • dockapps.wmcube
    • idrisPackages.cube
    • spacenav-cube-example
    • kdePackages.kjumpingcube
    • roundcubePlugins.carddav
    • gnomeExtensions.desktop-cube
    • phpExtensions.ioncube-loader
    • python312Packages.complycube
    • python313Packages.complycube
    • python314Packages.complycube
    • roundcubePlugins.contextmenu
    • roundcubePlugins.custom_from
    • haskellPackages.resistor-cube
    • python312Packages.maxcube-api
    • python313Packages.maxcube-api
    • python314Packages.maxcube-api
    • haskellPackages.marching-cubes
    • php81Extensions.ioncube-loader
    • php82Extensions.ioncube-loader
    • php83Extensions.ioncube-loader
    • php84Extensions.ioncube-loader
    • haskellPackages.marching-cubes2
    • python312Packages.spectral-cube
    • python313Packages.spectral-cube
    • python314Packages.spectral-cube
    • roundcubePlugins.persistent_login
    • roundcubePlugins.thunderbird_labels
    • home-assistant-component-tests.maxcube
    • tests.home-assistant-component-tests.maxcube
  • @LeSuisse dismissed
Cube privilege escalation via a specially crafted request

Cube is a semantic layer for building data applications. From 0.27.19 to before 1.5.13, 1.4.2, and 1.0.14, it is possible to make a specially crafted request with a valid API token that leads to privilege escalation. This vulnerability is fixed in 1.5.13, 1.4.2, and 1.0.14.

Affected products

cube
  • ==>= 0.27.19, < 1.0.14
  • ==>= 1.1.0, < 1.4.2
  • ==>= 1.5.0, < 1.5.13
Not present in nixpkgs.
Permalink CVE-2026-2202
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package vimPlugins.nvim-treesitter-parsers.strace
  • @LeSuisse dismissed
Tenda AC8 httpd WifiGuestSet fromSetWifiGusetBasic buffer overflow

A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.

Affected products

AC8
  • ==16.03.33.05
Not present in nixpkgs
Permalink CVE-2026-1615
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    27 packages
    • rubyPackages.jsonpath
    • haskellPackages.jsonpath
    • rubyPackages_3_1.jsonpath
    • rubyPackages_3_2.jsonpath
    • rubyPackages_3_3.jsonpath
    • rubyPackages_3_4.jsonpath
    • rubyPackages_4_0.jsonpath
    • python312Packages.jsonpath
    • python313Packages.jsonpath
    • python314Packages.jsonpath
    • typstPackages.jsonpath_0_1_0
    • python312Packages.jsonpath-ng
    • python312Packages.jsonpath-rw
    • python313Packages.jsonpath-ng
    • python313Packages.jsonpath-rw
    • python314Packages.jsonpath-ng
    • python314Packages.jsonpath-rw
    • haskellPackages.aeson-jsonpath
    • python312Packages.bc-jsonpath-ng
    • python313Packages.bc-jsonpath-ng
    • python314Packages.bc-jsonpath-ng
    • python312Packages.jsonpath-python
    • python312Packages.python-jsonpath
    • python313Packages.jsonpath-python
    • python313Packages.python-jsonpath
    • python314Packages.jsonpath-python
    • python314Packages.python-jsonpath
  • @LeSuisse dismissed
All versions of the package jsonpath are vulnerable to Arbitrary …

All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.

Affected products

jsonpath
  • *
  • <1.2.0
org.webjars.npm:jsonpath
  • *
  • <1.2.0
JS dep, not directly packaged in nixpkgs.
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. As of time of publication, no known patches exist.

Affected products

nbconvert
  • =<7.16.6
  • <7.17.0

Matching in nixpkgs

Package maintainers

Windows only, not an issue for nixpkgs
Permalink CVE-2025-15288
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    20 packages
    • bash
    • interactsh
    • bashInteractive
    • gawkInteractive
    • coqPackages.ITree
    • bashInteractiveFHS
    • sqlite-interactive
    • texinfoInteractive
    • interactive-html-bom
    • kotlin-interactive-shell
    • perlPackages.IOInteractive
    • git-interactive-rebase-tool
    • perl538Packages.IOInteractive
    • perl540Packages.IOInteractive
    • perlPackages.IOInteractiveTiny
    • ocamlPackages.async_interactive
    • azure-cli-extensions.interactive
    • perl538Packages.IOInteractiveTiny
    • perl540Packages.IOInteractiveTiny
    • ocamlPackages.janeStreet.async_interactive
  • @jopejoe1 dismissed
Tanium addressed an improper access controls vulnerability in Interact.

Tanium addressed an improper access controls vulnerability in Interact.

Affected products

Interact
  • <3.5.90
Not present in nixpkgs
Permalink CVE-2026-21418
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    37 packages
    • libunity
    • unityhub
    • unity-test
    • daggerfall-unity
    • kubemq-community
    • louvain-community
    • documize-community
    • rainloop-community
    • daggerfall-unity-unfree
    • jetbrains.idea-community
    • jetbrains.pycharm-community
    • v2ray-domain-list-community
    • jetbrains.idea-community-bin
    • jetbrains.idea-community-src
    • jetbrains.pycharm-community-bin
    • jetbrains.pycharm-community-src
    • cortex-command-community-project
    • perlPackages.PerlCriticCommunity
    • python312Packages.suds-community
    • python313Packages.suds-community
    • perl538Packages.PerlCriticCommunity
    • perl540Packages.PerlCriticCommunity
    • python312Packages.langchain-community
    • python313Packages.langchain-community
    • phpPackages.composer-local-repo-plugin
    • gnomeExtensions.unity-like-app-switcher
    • haskellPackages.unity-testresult-parser
    • php81Packages.composer-local-repo-plugin
    • php82Packages.composer-local-repo-plugin
    • php83Packages.composer-local-repo-plugin
    • php84Packages.composer-local-repo-plugin
    • typstPackages.muw-touying-community_0_1_0
    • typstPackages.muw-community-templates_0_1_0
    • typstPackages.muw-community-templates_0_1_1
    • typstPackages.hhn-unitylab-thesis-template_0_0_1
    • typstPackages.hhn-unitylab-thesis-template_0_0_2
    • vscode-extensions.visualstudiotoolsforunity.vstuc
  • @jopejoe1 dismissed
Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization …

Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.

Affected products

Unity
  • <5.5.3
Not present in nixpkgs
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 dismissed
Improper Validation in Conduit-derived homeservers resulting in Unintended Proxy or Intermediary ('Confused Deputy')

continuwuity is a Matrix homeserver written in Rust. This vulnerability allows an attacker with a malicious remote server to cause the local server to sign an arbitrary event upon user interaction. Upon a user account leaving a room (rejecting an invite), joining a room or knocking on a room, the victim server may ask a remote server for assistance. If the victim asks the attacker server for assistance the attacker is able to provide an arbitrary event, which the victim will sign and return to the attacker. For the /leave endpoint, this works for any event with a supported room version, where the origin and origin_server_ts is set by the victim. For the /join endpoint, an additionally victim-set content field in the format of a join membership is needed. For the /knock endpoint, an additional victim-set content field in the format of a knock membership and a room version not between 1 and 6 is needed. This was exploited as a part of a larger chain against the continuwuity.org homeserver. This vulnerability affects all Conduit-derived servers. This vulnerability is fixed in Continuwuity 0.5.1, Conduit 0.10.11, Grapevine 0aae932b, and Tuwunel 1.4.9.

Affected products

continuwuity
  • ==< 0.5.1

Matching in nixpkgs

Package maintainers

Already fixed in all supported channels

continuwuity: https://github.com/NixOS/nixpkgs/commit/085ce9e763f84d87e6c59bf7c2423b4eab97c5ea
conduit: https://github.com/NixOS/nixpkgs/commit/05eb51d70b6f57696fa61c714d2264057b64f98a
tuwunel: https://github.com/NixOS/nixpkgs/commit/e9bc0bead84c1a7ea6191ceda3ba3eda3196ca7a
Permalink CVE-2025-68157
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • perlPackages.MojoliciousPluginWebpack
    • python312Packages.django-webpack-loader
    • python313Packages.django-webpack-loader
    • python314Packages.django-webpack-loader
    • perl538Packages.MojoliciousPluginWebpack
    • perl540Packages.MojoliciousPluginWebpack
  • @LeSuisse dismissed
webpack buildHttp HttpUriPlugin allowedUris bypass via HTTP redirects

Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.

Affected products

webpack
  • ==>= 5.49.0, < 5.104.0

Matching in nixpkgs

pkgs.nodePackages.webpack

Packs ECMAScript/CommonJs/AMD modules for the browser. Allows you to split your codebase into multiple bundles, which can be loaded on demand. Supports loaders to preprocess files, i.e. json, jsx, es7, css, less, ... and your custom stuff.

pkgs.nodePackages_latest.webpack

Packs ECMAScript/CommonJs/AMD modules for the browser. Allows you to split your codebase into multiple bundles, which can be loaded on demand. Supports loaders to preprocess files, i.e. json, jsx, es7, css, less, ... and your custom stuff.

Package maintainers

Current stable was never impacted.

https://github.com/NixOS/nixpkgs/commit/a94dc905b34f1d2cac0c6145311ec8699293c277