Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package gnomeExtensions.openwispr-gnome-extension
  • @mweinelt dismissed
Path Traversal in wisp.serve_static allows arbitrary file read

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in gleam-wisp wisp allows arbitrary file read via percent-encoded path traversal. The wisp.serve_static function is vulnerable to path traversal because sanitization runs before percent-decoding. The encoded sequence %2e%2e passes through string.replace unchanged, then uri.percent_decode converts it to .., which the OS resolves as directory traversal when the file is read. An unauthenticated attacker can read any file readable by the application process in a single HTTP request, including application source code, configuration files, secrets, and system files. This issue affects wisp: from 2.1.1 before 2.2.1.

Affected products

wisp
  • <2.2.1
  • <pkg:hex/wisp@2.2.1
gleam-wisp/wisp
  • <161118c431047f7ef1ff7cabfcc38981877fdd93
  • <pkg:github/gleam-wisp/wisp@161118c431047f7ef1ff7cabfcc38981877fdd93
Ignored packages (1)

pkgs.gnomeExtensions.openwispr-gnome-extension

AI-powered voice-to-text dictation for GNOME. Requires the openwispr companion engine service for recording/transcription. Uses clipboard copy/paste for output (optional auto-paste). Optional remote STT/LLM requests are sent only to user-configured providers.

  • nixos-unstable 3
    • nixpkgs-unstable 3
    • nixos-unstable-small 3
Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • python312Packages.azure-mgmt-commerce
    • python313Packages.azure-mgmt-commerce
    • python314Packages.azure-mgmt-commerce
    • python312Packages.mypy-boto3-marketplacecommerceanalytics
    • python313Packages.mypy-boto3-marketplacecommerceanalytics
    • python314Packages.mypy-boto3-marketplacecommerceanalytics
    • python312Packages.types-aiobotocore-marketplacecommerceanalytics
    • python313Packages.types-aiobotocore-marketplacecommerceanalytics
  • @mweinelt dismissed
Craft Commerce has Stored XSS in Craft Commerce Order Details Slideout

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Craft Commerce Order details. Malicious JavaScript can be injected via the Shipping Method Name, Order Reference, or Site Name. When a user opens the order details slideout via a double-click on the order index page, the injected payload executes. This vulnerability is fixed in 4.10.2 and 5.5.3.

Affected products

commerce
  • ==>= 4.0.0 < 4.10.2
  • ==>= 5.0.0 < 5.5.3
Ignored packages (8)
Not in nixpkgs
Permalink CVE-2026-31801
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • zotero
    • zotify
    • zotero_7
    • zotero-beta
    • haskellPackages.zot
    • zotero-translation-server
  • @mweinelt dismissed
zot create-only policy allows overwrite attempts of existing latest tag (update permission not required)

zot is ancontainer image/artifact registry based on the Open Container Initiative Distribution Specification. From 1.3.0 to 2.1.14, zot’s dist-spec authorization middleware infers the required action for PUT /v2/{name}/manifests/{reference} as create by default, and only switches to update when the tag already exists and reference != "latest". As a result, when latest already exists, a user who is allowed to create (but not allowed to update) can still pass the authorization check for an overwrite attempt of latest. This vulnerability is fixed in 2.1.15.

Affected products

zot
  • ==>= 1.3.0, < v2.1.15
Ignored packages (6)

pkgs.zotify

Fast and customizable music and podcast downloader

Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • python312Packages.azure-mgmt-commerce
    • python313Packages.azure-mgmt-commerce
    • python314Packages.azure-mgmt-commerce
    • python312Packages.mypy-boto3-marketplacecommerceanalytics
    • python313Packages.mypy-boto3-marketplacecommerceanalytics
    • python314Packages.mypy-boto3-marketplacecommerceanalytics
    • python312Packages.types-aiobotocore-marketplacecommerceanalytics
    • python313Packages.types-aiobotocore-marketplacecommerceanalytics
  • @mweinelt dismissed
Craft Commerce has Stored XSS while updating Order Status from Orders Table

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a stored XSS vulnerability exists when a user tries to update the Order Status from the Commerce Orders Table. The Order Status Name is rendered without proper escaping, allowing script execution to occur. This vulnerability is fixed in 4.10.2 and 5.5.3.

Affected products

commerce
  • ==>= 4.0.0 < 4.10.2
  • ==>= 5.0.0 < 5.5.3
Ignored packages (8)
Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • python312Packages.azure-mgmt-commerce
    • python313Packages.azure-mgmt-commerce
    • python314Packages.azure-mgmt-commerce
    • python312Packages.mypy-boto3-marketplacecommerceanalytics
    • python313Packages.mypy-boto3-marketplacecommerceanalytics
    • python314Packages.mypy-boto3-marketplacecommerceanalytics
    • python312Packages.types-aiobotocore-marketplacecommerceanalytics
    • python313Packages.types-aiobotocore-marketplacecommerceanalytics
  • @mweinelt dismissed
Multiple Stored XSS in Commerce Inventory Page Leading to Session Hijacking

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, Stored XSS vulnerabilities exist in the Commerce Inventory page. The Product Title, Variant Title, and Variant SKU fields are rendered without proper HTML escaping, allowing an attacker to execute arbitrary JavaScript when any user (including administrators) views the inventory management page. This vulnerability is fixed in 5.5.3.

Affected products

commerce
  • ==>= 5.0.0 < 5.5.3
Ignored packages (8)
Not in nixpkgs
Permalink CVE-2026-31808
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    4 packages
    • perlPackages.FileType
    • perl5Packages.FileType
    • perl538Packages.FileType
    • perl540Packages.FileType
  • @mweinelt dismissed
file-type affected by infinite loop in ASF parser on malformed input with zero-size sub-header

file-type detects the file type of a file, stream, or data. Prior to 21.3.1, a denial of service vulnerability exists in the ASF (WMV/WMA) file type detection parser. When parsing a crafted input where an ASF sub-header has a size field of zero, the parser enters an infinite loop. The payload value becomes negative (-24), causing tokenizer.ignore(payload) to move the read position backwards, so the same sub-header is read repeatedly forever. Any application that uses file-type to detect the type of untrusted/attacker-controlled input is affected. An attacker can stall the Node.js event loop with a 55-byte payload. Fixed in version 21.3.1.

Affected products

file-type
  • ==>= 13.0.0, < 21.3.1
Ignored packages (4)
Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    33 packages
    • mongodb
    • mongodb-ce
    • mongodb-6_0
    • mongodb-7_0
    • mongodb-cli
    • mongodb-compass
    • mongodb-atlas-cli
    • perlPackages.MongoDB
    • phpExtensions.mongodb
    • haskellPackages.mongoDB
    • perl538Packages.MongoDB
    • perl540Packages.MongoDB
    • php81Extensions.mongodb
    • php82Extensions.mongodb
    • php83Extensions.mongodb
    • php84Extensions.mongodb
    • php85Extensions.mongodb
    • akkuPackages.r6rs-mongodb
    • prometheus-mongodb-exporter
    • haskellPackages.pipes-mongodb
    • graylogPlugins.mongodb-profiler
    • terraform-providers.mongodbatlas
    • python312Packages.langchain-mongodb
    • python313Packages.langchain-mongodb
    • python314Packages.langchain-mongodb
    • terraform-providers.mongodb_mongodbatlas
    • vscode-extensions.mongodb.mongodb-vscode
    • python312Packages.langgraph-store-mongodb
    • python313Packages.langgraph-store-mongodb
    • python314Packages.langgraph-store-mongodb
    • python312Packages.langgraph-checkpoint-mongodb
    • python313Packages.langgraph-checkpoint-mongodb
    • python314Packages.langgraph-checkpoint-mongodb
  • @mweinelt dismissed
NoSQL Injection via WebSocket id Parameter in MongoDB Adapter

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection. This vulnerability is fixed in 5.0.42.

Affected products

mongodb
  • ==>= 5.0.0, < 5.0.42
Ignored packages (33)

pkgs.mongodb-6_0

Scalable, high-performance, open source NoSQL database

Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • python312Packages.azure-mgmt-commerce
    • python313Packages.azure-mgmt-commerce
    • python314Packages.azure-mgmt-commerce
    • python312Packages.mypy-boto3-marketplacecommerceanalytics
    • python313Packages.mypy-boto3-marketplacecommerceanalytics
    • python314Packages.mypy-boto3-marketplacecommerceanalytics
    • python312Packages.types-aiobotocore-marketplacecommerceanalytics
    • python313Packages.types-aiobotocore-marketplacecommerceanalytics
  • @mweinelt dismissed
Craft Commerce has Stored XSS in Inventory Location Name

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, A stored XSS vulnerability exists in the Commerce Settings - Inventory Locations page. The Name field is rendered without proper HTML escaping, allowing an attacker to execute arbitrary JavaScript. This XSS triggers when an administrator (or user with product editing permissions) creates or edits a variant product. This vulnerability is fixed in 5.5.3.

Affected products

commerce
  • ==>= 4.0.0 < 4.10.2
  • ==>= 5.0.0 < 5.5.3
Ignored packages (8)
Not in nixpkgs
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    27 packages
    • flare
    • flarectl
    • photoflare
    • cloudflared
    • flare-floss
    • gotlsaflare
    • flare-signal
    • flaresolverr
    • cloudflare-cli
    • cloudflare-ddns
    • cloudflare-warp
    • cloudflare-utils
    • cloudflare-dyndns
    • speed-cloudflare-cli
    • cloudflare-dynamic-dns
    • octodns-providers.cloudflare
    • python312Packages.cloudflare
    • python313Packages.cloudflare
    • python314Packages.cloudflare
    • prometheus-cloudflare-exporter
    • terraform-providers.cloudflare
    • haskellPackages.hs-opentelemetry-instrumentation-cloudflare
    • gnomeExtensions.cloudflare-warp-toggle
    • home-assistant-component-tests.cloudflare
    • terraform-providers.cloudflare_cloudflare
    • tests.home-assistant-component-tests.cloudflare
    • tests.home-assistant-component-tests.cloudflare_r2
  • @mweinelt dismissed
Flare has a Path Traversal in /api/avatars/[filename]

Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to 1.7.3, an authenticated path traversal vulnerability in /api/avatars/[filename] allows any logged-in user to read arbitrary files from within the application container. The filename URL parameter is passed to path.join() without sanitization, and getFileStream() performs no path validation, enabling %2F-encoded ../ sequences to escape the uploads/avatars/ directory and read any file accessible to the nextjs process under /app/. Authentication is enforced by Next.js middleware. However, on instances with open registration enabled (the default), any attacker can self-register and immediately exploit this. This vulnerability is fixed in 1.7.3.

Affected products

Flare
  • ==< 1.7.3
Ignored packages (27)
Not in nixpkgs
Permalink CVE-2026-3845
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    21 packages
    • firefoxpwa
    • faust2firefox
    • firefox_decrypt
    • pkgsRocm.firefox
    • firefox-gnome-theme
    • firefox-sync-client
    • pkgsRocm.firefoxpwa
    • firefox-esr-unwrapped
    • pkgsRocm.firefox-beta
    • firefox-beta-unwrapped
    • pkgsRocm.firefox-mobile
    • firefox-esr-140-unwrapped
    • pkgsRocm.firefox-unwrapped
    • pkgsRocm.firefox-devedition
    • firefox-devedition-unwrapped
    • pkgsRocm.firefox-beta-unwrapped
    • gnomeExtensions.firefox-profiles
    • pkgsRocm.firefox-devedition-unwrapped
    • gnomeExtensions.firefox-pip-always-on-top
    • gnomeExtensions.pip-alwaysontop-for-firefox
    • vscode-extensions.firefox-devtools.vscode-firefox-debug
  • @mweinelt dismissed
Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox < 148.0.2.

Affected products

Firefox
  • <148.0.2

Matching in nixpkgs

Ignored packages (21)

Package maintainers

https://github.com/NixOS/nixpkgs/pull/498530
https://github.com/NixOS/nixpkgs/pull/498671