Nixpkgs Security Tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

CVE-2025-66388
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 15 hours ago
Apache Airflow: Secrets in rendered templates not redacted properly and exposed in the UI

A vulnerability in Apache Airflow allowed authenticated UI users to view secret values in rendered templates due to secrets not being properly redacted, potentially exposing secrets to users without the appropriate authorization. Users are recommended to upgrade to version 3.1.4, which fixes this issue.

Affected products

apache-airflow
  • <3.1.4

Matching in nixpkgs

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines

Package maintainers: 3

created 3 days, 8 hours ago
A missing encryption of sensitive data vulnerability was found in the UPS settings of ADM

When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certificate verification can allow an attacker able to intercept network traffic between the client and server can perform a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the UPS server configuation. This issue affects ADM: from 4.1.0 through 4.3.3.RKD2, from 5.0.0 through 5.1.0.RN42.

Affected products

UPS
  • =<4.3.3.RKD2
  • =<5.1.0.RN42

Matching in nixpkgs

pkgs.perlPackages.NetCUPS

Common Unix Printing System Interface

pkgs.perl538Packages.NetCUPS

Common Unix Printing System Interface

pkgs.perl540Packages.NetCUPS

Common Unix Printing System Interface

pkgs.perl540Packages.NetCUPS.x86_64-linux

Common Unix Printing System Interface

pkgs.perl540Packages.NetCUPS.aarch64-linux

Common Unix Printing System Interface

pkgs.perl540Packages.NetCUPS.x86_64-darwin

Common Unix Printing System Interface

pkgs.perl540Packages.NetCUPS.aarch64-darwin

Common Unix Printing System Interface

CVE-2025-8083
8.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
updated 2 days, 6 hours ago by @Erethon Activity log
  • Created automatic suggestion
  • @Erethon removed package python312Packages.ipyvuetify.x86_64-darwin
Vuetify Prototype Pollution via Preset options

The Preset configuration https://v2.vuetifyjs.com/en/features/presets  feature of Vuetify is vulnerable to Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data. If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process. This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

Affected products

vuetify
  • ==>=2.2.0-beta.2 <3.0.0-alpha.10

Matching in nixpkgs

pkgs.python311Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.x86_64-linux

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.aarch64-linux

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.aarch64-darwin

Jupyter widgets based on Vuetify UI Components

Package maintainers: 1

CVE-2025-8082
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 2 days, 6 hours ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @fricklerhandwerk removed
    2 packages
    • python312Packages.ipyvuetify.aarch64-darwin
    • python312Packages.ipyvuetify.x86_64-darwin
Vuetify XSS via unsanitized 'titleDateFormat' in 'VDatePicker'

Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

Affected products

vuetify
  • ==>=2.0.0 <3.0.0

Matching in nixpkgs

pkgs.python311Packages.ipyvuetify

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.x86_64-linux

Jupyter widgets based on Vuetify UI Components

pkgs.python312Packages.ipyvuetify.aarch64-linux

Jupyter widgets based on Vuetify UI Components

Package maintainers: 1

CVE-2013-10031
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 3 days, 8 hours ago
Plack::Middleware::Session versions before 0.17 for Perl may be vulnerable to HMAC comparison timing attacks

Plack-Middleware-Session versions before 0.17 may be vulnerable to HMAC comparison timing attacks

Affected products

Plack-Middleware-Session
  • <0.17

Matching in nixpkgs

pkgs.perlPackages.PlackMiddlewareSession

Middleware for session management

pkgs.perl538Packages.PlackMiddlewareSession

Middleware for session management

pkgs.perl540Packages.PlackMiddlewareSession

Middleware for session management

pkgs.perl540Packages.PlackMiddlewareSession.x86_64-linux

Middleware for session management

pkgs.perl540Packages.PlackMiddlewareSession.aarch64-linux

Middleware for session management

pkgs.perl540Packages.PlackMiddlewareSession.x86_64-darwin

Middleware for session management

pkgs.perl540Packages.PlackMiddlewareSession.aarch64-darwin

Middleware for session management

created 3 days, 8 hours ago
Ubuntu Apport Insecure File Permissions Vulnerability

It was discovered that process_crash() in data/apport in Canonical's Apport crash reporting tool may create crash files with incorrect group ownership, possibly exposing crash information beyond expected or intended groups.

Affected products

apport
  • <2.20.11-0ubuntu82.7
  • <2.20.9-0ubuntu7.29+esm1
  • <2.32.0-0ubuntu5.1
  • <2.28.1-0ubuntu3.6
  • <2.20.1-0ubuntu2.30+esm5
  • <2.20.11-0ubuntu27.28
  • <2.33.0-0ubuntu1

Matching in nixpkgs

Package maintainers: 1

CVE-2025-66004
5.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 days, 8 hours ago
Local privilege escalation in usbmuxd from arbitrary local user to usbmux

A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.This issue affects usbmuxd: before 3ded00c9985a5108cfc7591a309f9a23d57a8cba.

Affected products

usbmuxd
  • <3ded00c9985a5108cfc7591a309f9a23d57a8cba

Matching in nixpkgs

pkgs.libusbmuxd

Client library to multiplex connections from and to iOS devices

pkgs.libusbmuxd.x86_64-linux

Client library to multiplex connections from and to iOS devices

pkgs.libusbmuxd.aarch64-linux

Client library to multiplex connections from and to iOS devices

pkgs.libusbmuxd.x86_64-darwin

Client library to multiplex connections from and to iOS devices

pkgs.libusbmuxd.aarch64-darwin

Client library to multiplex connections from and to iOS devices

Package maintainers: 1

CVE-2025-66527
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 3 days, 8 hours ago
WordPress Lobo theme <= 2.8.6 - Broken Access Control vulnerability

Missing Authorization vulnerability in VanKarWai Lobo lobo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Lobo: from n/a through <= 2.8.6.

Affected products

lobo
  • =<<= 2.8.6

Matching in nixpkgs

Package maintainers: 1

CVE-2025-62103
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 3 days, 8 hours ago
WordPress Media Library File Download plugin <= 1.4 - Cross Site Request Forgery (CSRF) vulnerability

Cross-Site Request Forgery (CSRF) vulnerability in wpmediadownload Media Library File Download media-download allows Cross Site Request Forgery.This issue affects Media Library File Download: from n/a through <= 1.4.

Affected products

media-download
  • =<<= 1.4

Matching in nixpkgs

Package maintainers: 2

CVE-2025-67549
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 days, 8 hours ago
WordPress oik plugin <= 4.15.3 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bobbingwide oik oik allows DOM-Based XSS.This issue affects oik: from n/a through <= 4.15.3.

Affected products

oik
  • =<<= 4.15.3

Matching in nixpkgs

pkgs.voikko-fi

Description of Finnish morphology written for libvoikko

pkgs.libvoikko.x86_64-linux

Finnish language processing library

pkgs.libvoikko.aarch64-linux

Finnish language processing library

pkgs.libvoikko.x86_64-darwin

Finnish language processing library

pkgs.libvoikko.aarch64-darwin

Finnish language processing library

Package maintainers: 2