Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-68458
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • perlPackages.MojoliciousPluginWebpack
    • python312Packages.django-webpack-loader
    • python313Packages.django-webpack-loader
    • python314Packages.django-webpack-loader
    • perl538Packages.MojoliciousPluginWebpack
    • perl540Packages.MojoliciousPluginWebpack
  • @LeSuisse dismissed
webpack buildHttp: allowedUris allow-list bypass via URL userinfo (@) leading to build-time SSRF behavior

Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.

Affected products

webpack
  • ==>= 5.49.0, < 5.104.1

Matching in nixpkgs

pkgs.nodePackages.webpack

Packs ECMAScript/CommonJs/AMD modules for the browser. Allows you to split your codebase into multiple bundles, which can be loaded on demand. Supports loaders to preprocess files, i.e. json, jsx, es7, css, less, ... and your custom stuff.

pkgs.nodePackages_latest.webpack

Packs ECMAScript/CommonJs/AMD modules for the browser. Allows you to split your codebase into multiple bundles, which can be loaded on demand. Supports loaders to preprocess files, i.e. json, jsx, es7, css, less, ... and your custom stuff.

Package maintainers

Current stable was never impacted.

https://github.com/NixOS/nixpkgs/commit/a94dc905b34f1d2cac0c6145311ec8699293c277
Permalink CVE-2020-37014
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package tryton
  • @jopejoe1 dismissed
Tryton 5.4 - Persistent Cross-Site Scripting

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

Affected products

Tryton
  • =<5.4

Matching in nixpkgs

Package maintainers

Current stable was never impacted

https://github.com/NixOS/nixpkgs/commit/218c8509c6ce25945c2c253d15e9542033d4de44
Permalink CVE-2021-47908
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • nnd
    • nim1
    • nim2
    • nim-2_0
    • lixStatic
    • nixStatic
  • @jopejoe1 dismissed
Ultimate POS 4.4 Persistent Cross-Site Scripting via Product Name

Ultimate POS 4.4 contains a persistent cross-site scripting vulnerability in the product name parameter that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability through product add or edit functions to execute arbitrary JavaScript and potentially hijack user sessions.

Affected products

Unknown
  • ==4.4
Not present in nixpkgs
Permalink CVE-2026-2181
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package go-crx3
  • @jopejoe1 dismissed
Tenda RX3 openSchedWifi stack-based overflow

A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

Affected products

RX3
  • ==16.03.13.11
Not present in nixpkgs
Permalink CVE-2026-2192
7.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package vimPlugins.nvim-treesitter-parsers.kconfig
  • @jopejoe1 dismissed
Tenda AC9 formGetRebootTimer stack-based overflow

A security vulnerability has been detected in Tenda AC9 15.03.06.42_multi. Affected by this vulnerability is the function formGetRebootTimer. Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Affected products

AC9
  • ==15.03.06.42_multi
Not present in nixpkgs
Permalink CVE-2026-2187
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 dismissed
Tenda RX3 formSetQosBand set_qosMib_list stack-based overflow

A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used.

Affected products

RX3
  • ==16.03.13.11

Matching in nixpkgs

Package maintainers

Not present in nixpkgs
Permalink CVE-2026-2191
7.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 dismissed
Tenda AC9 formGetDdosDefenceList stack-based overflow

A weakness has been identified in Tenda AC9 15.03.06.42_multi. Affected is the function formGetDdosDefenceList. This manipulation of the argument security.ddos.map causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

Affected products

AC9
  • ==15.03.06.42_multi

Matching in nixpkgs

Not present in nixpkgs
Permalink CVE-2026-2185
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package go-crx3
  • @jopejoe1 dismissed
Tenda RX3 MAC Filtering Configuration Endpoint setBlackRule set_device_name stack-based overflow

A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.

Affected products

RX3
  • ==16.03.13.11
Not present in nixpkgs
Permalink CVE-2026-2180
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @LeSuisse removed package go-crx3
  • @jopejoe1 dismissed
Tenda RX3 fast_setting_wifi_set stack-based overflow

A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.

Affected products

RX3
  • ==16.03.13.11
Not present in nixpkgs
Permalink CVE-2025-47397
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 dismissed
Improper Release of Memory Before Removing Last Reference in Graphics

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

Affected products

Snapdragon
  • ==QCA6797AQ
  • ==SA7255P
  • ==QAM8295P
  • ==SA7775P
  • ==SAR2230P
  • ==SXR2230P
  • ==SAR2130P
  • ==SA8295P
  • ==WCD9335
  • ==SW5100P
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==SA8195P
  • ==SXR2250P
  • ==Snapdragon 460 Mobile Platform
  • ==Snapdragon 8 Elite
  • ==SM8635P
  • ==WCN6450
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==G2 Gen 1
  • ==SW5100
  • ==QCA6391
  • ==SM8635
  • ==QCA6696
  • ==QLN1086BD
  • ==QMP1000
  • ==QCS6690
  • ==WCN3910
  • ==QCA6688AQ
  • ==QCM5430
  • ==QXM1094
  • ==Palawan25
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==SM8650Q
  • ==QRB5165N
  • ==SA8620P
  • ==QCA6698AQ
  • ==WCN7880
  • ==SW6100
  • ==WCN7861
  • ==WSA8840
  • ==QAMSRV1H
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==Snapdragon 7 Gen 4 Mobile Platform
  • ==QCM8838
  • ==Vision Intelligence 400 Platform
  • ==Kalpeni
  • ==TalynPlus
  • ==QCM4490
  • ==SRV1H
  • ==SM6225P
  • ==G1 Gen 1
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QCA6595
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCA6574AU
  • ==QPA1086BD
  • ==Themisto
  • ==QCA8695AU
  • ==QXM1095
  • ==Monaco_IOT
  • ==WCN6650
  • ==QLN1083BD
  • ==QCA6574
  • ==WCN7860
  • ==SD865 5G
  • ==LeMans_AU_LGIT
  • ==QCA6698AU
  • ==SA8155P
  • ==WCN7881
  • ==SSG2125P
  • ==SM7675P
  • ==SAR1250P
  • ==WCD9380
  • ==WCN3988
  • ==Milos_IOT
  • ==SXR2330P
  • ==QAM8255P
  • ==WCD9341
  • ==IQ6 Series Platform
  • ==SRV1L
  • ==SRV1M
  • ==WCD9370
  • ==SA6155P
  • ==SW6100P
  • ==SA8255P
  • ==FastConnect 6900
  • ==FastConnect 6200
  • ==SXR2350P
  • ==QCA6574A
  • ==QCM2290
  • ==QXM1093
  • ==WSA8845
  • ==FastConnect 6700
  • ==QXM1096
  • ==QCS4490
  • ==Snapdragon 8 Elite Gen 5
  • ==SA8770P
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==WCD9385
  • ==QPA1083BD
  • ==WCN6755
  • ==QCM6490
  • ==Robotics RB5 Platform
  • ==SD662
  • ==QCS2290
  • ==WCD9395
  • ==SXR1230P
  • ==SSG2115P
  • ==QCN9012
  • ==SA9000P
  • ==QMB415
  • ==Pandeiro
  • ==QCS4290
  • ==LeMansAU
  • ==Snapdragon 695 5G Mobile Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==Flight RB5 5G Platform
  • ==SM7635P
  • ==QCS8550
  • ==IQ9 Series Platform
  • ==QCA6678AQ
  • ==WSA8810
  • ==SD 8 Gen1 5G
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCN3980
  • ==WSA8845H
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SDR753
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==QCN9274
  • ==WCN3950
  • ==QMB715
  • ==WSA8830
  • ==Snapdragon 480 5G Mobile Platform
  • ==Milos
  • ==QAMSRV1M
  • ==QAM8620P
  • ==QCM6125
  • ==Snapdragon 680 4G Mobile Platform
  • ==QAM8397P
  • ==QCM4325
  • ==SM8750P
  • ==SM6650P
  • ==Snapdragon 662 Mobile Platform
  • ==WCD9378
  • ==WCD9375
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==QCN9011
  • ==SM8550P
  • ==WSA8835
  • ==WSA8832
  • ==FastConnect 7800
  • ==QCA6595AU
  • ==QCM8550
  • ==IQ10 Series
  • ==IQ8 Series Platform
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM7675
  • ==Orne
  • ==WCN3990
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==Snapdragon 685 4G Mobile Platform
  • ==QAM8797P
  • ==WSA8815
  • ==WCD9390
  • ==Snapdragon XR2 5G Platform

Matching in nixpkgs

Not present in nixpkgs