CVE-2025-58820 5.9 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 3 days, 9 hours ago WordPress Carousel Ultimate Plugin <= 1.8 - Cross Site Scripting (XSS) Vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themepoints Carousel Ultimate allows Stored XSS. This issue affects Carousel Ultimate: from n/a through 1.8. Affected products carousel =<1.8 Matching in nixpkgs pkgs.haskellPackages.data-carousel A rotating sequence data structure nixos-25.05 ??? nixos-25.05-small 0.1.0.0 nixos-25.11 0.1.0.0 nixpkgs-25.11-darwin 0.1.0.0 nixos-unstable 0.1.0.0 nixos-unstable-small 0.1.0.0 nixpkgs-unstable 0.1.0.0 pkgs.haskellPackages.data-carousel.x86_64-linux A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.haskellPackages.data-carousel.aarch64-linux A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.haskellPackages.data-carousel.x86_64-darwin A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.haskellPackages.data-carousel.aarch64-darwin A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0
pkgs.haskellPackages.data-carousel A rotating sequence data structure nixos-25.05 ??? nixos-25.05-small 0.1.0.0 nixos-25.11 0.1.0.0 nixpkgs-25.11-darwin 0.1.0.0 nixos-unstable 0.1.0.0 nixos-unstable-small 0.1.0.0 nixpkgs-unstable 0.1.0.0
pkgs.haskellPackages.data-carousel.x86_64-linux A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0
pkgs.haskellPackages.data-carousel.aarch64-linux A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0
pkgs.haskellPackages.data-carousel.x86_64-darwin A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0
pkgs.haskellPackages.data-carousel.aarch64-darwin A rotating sequence data structure nixos-unstable ??? nixpkgs-unstable 0.1.0.0
CVE-2025-58801 5.4 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): LOW created 3 days, 9 hours ago WordPress Responder Plugin <= 4.3.8 - Cross Site Request Forgery (CSRF) Vulnerability Cross-Site Request Forgery (CSRF) vulnerability in KCS Responder allows Cross Site Request Forgery. This issue affects Responder: from n/a through 4.3.8. Affected products responder =<4.3.8 Matching in nixpkgs pkgs.responder LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-25.05 ??? nixos-25.05-small 3.1.5.0 nixos-25.11 3.1.7.0 nixpkgs-25.11-darwin 3.1.7.0 nixos-unstable 3.1.6.0 nixos-unstable-small 3.1.6.0 nixpkgs-unstable 3.1.6.0 pkgs.responder.x86_64-linux LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0 pkgs.responder.aarch64-linux LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0 pkgs.responder.x86_64-darwin LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0 pkgs.responder.aarch64-darwin LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0 Package maintainers: 1 @fabaff Fabian Affolter <mail@fabian-affolter.ch>
pkgs.responder LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-25.05 ??? nixos-25.05-small 3.1.5.0 nixos-25.11 3.1.7.0 nixpkgs-25.11-darwin 3.1.7.0 nixos-unstable 3.1.6.0 nixos-unstable-small 3.1.6.0 nixpkgs-unstable 3.1.6.0
pkgs.responder.x86_64-linux LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0
pkgs.responder.aarch64-linux LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0
pkgs.responder.x86_64-darwin LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0
pkgs.responder.aarch64-darwin LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server nixos-unstable 3.1.4.0
CVE-2025-9959 7.6 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): HIGH Availability impact (A): LOW created 3 days, 10 hours ago Sandbox escape in smolagents Local Python execution environment via dunder attributes Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code. Affected products smolagents <1.21.0 Matching in nixpkgs pkgs.python312Packages.smolagents Barebones library for agents nixos-25.05 ??? nixos-25.05-small 1.13.0 nixos-25.11 1.21.3 nixpkgs-25.11-darwin 1.21.3 nixos-unstable 1.20.0 nixos-unstable-small 1.16.1 nixpkgs-unstable 1.20.0 pkgs.python313Packages.smolagents Barebones library for agents nixos-25.05 ??? nixos-25.05-small 1.13.0 nixos-25.11 1.21.3 nixpkgs-25.11-darwin 1.21.3 nixos-unstable 1.20.0 nixos-unstable-small 1.20.0 nixpkgs-unstable 1.20.0 pkgs.pkgsRocm.python3Packages.smolagents Barebones library for agents nixos-25.11 1.21.3 nixpkgs-25.11-darwin 1.21.3 Package maintainers: 1 @fabaff Fabian Affolter <mail@fabian-affolter.ch>
pkgs.python312Packages.smolagents Barebones library for agents nixos-25.05 ??? nixos-25.05-small 1.13.0 nixos-25.11 1.21.3 nixpkgs-25.11-darwin 1.21.3 nixos-unstable 1.20.0 nixos-unstable-small 1.16.1 nixpkgs-unstable 1.20.0
pkgs.python313Packages.smolagents Barebones library for agents nixos-25.05 ??? nixos-25.05-small 1.13.0 nixos-25.11 1.21.3 nixpkgs-25.11-darwin 1.21.3 nixos-unstable 1.20.0 nixos-unstable-small 1.20.0 nixpkgs-unstable 1.20.0
pkgs.pkgsRocm.python3Packages.smolagents Barebones library for agents nixos-25.11 1.21.3 nixpkgs-25.11-darwin 1.21.3
CVE-2023-4693 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 3 days, 10 hours ago Grub2: out-of-bounds read at fs/ntfs.c An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk. Affected products grub2 * Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin Package maintainers: 4 @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @hehongbo Hongbo
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin
CVE-2025-0678 6.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 days, 10 hours ago Grub2: squash4: integer overflow may lead to heap based out-of-bounds write when reading data A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections. Affected products grub2 =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin Package maintainers: 4 @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @hehongbo Hongbo
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin
CVE-2023-4001 6.8 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 days, 10 hours ago Grub2: bypass the grub password protection feature An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package. Affected products grub2 * Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin Package maintainers: 4 @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @hehongbo Hongbo
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin
CVE-2025-0690 6.1 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 days, 10 hours ago Grub2: read: integer overflow may lead to out-of-bounds write The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. Affected products grub2 * =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin Package maintainers: 4 @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @hehongbo Hongbo
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin
CVE-2024-45775 5.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 3 days, 10 hours ago Grub2: commands/extcmd: missing check for failed allocation A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data. Affected products grub2 * =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin Package maintainers: 4 @CertainLach Yaroslav Bolyukin <iam@lach.pw> @digitalrane Rane <rane+git@junkyard.systems> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> @hehongbo Hongbo
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-25.11 ??? nixpkgs-25.11-darwin
CVE-2025-40927 7.3 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 3 days, 10 hours ago CGI::Simple versions 1.281 and earlier for Perl has a HTTP response splitting flaw CGI::Simple versions before 1.282 for Perl has a HTTP response splitting flaw This vulnerability is a confirmed HTTP response splitting flaw in CGI::Simple that allows HTTP response header injection, which can be used for reflected XSS or open redirect under certain conditions. Although some validation exists, it can be bypassed using URL-encoded values, allowing an attacker to inject untrusted content into the response via query parameters. As a result, an attacker can inject a line break (e.g. %0A) into the parameter value, causing the server to split the HTTP response and inject arbitrary headers or even an HTML/JavaScript body, leading to reflected cross-site scripting (XSS), open redirect or other attacks. The issue documented in CVE-2010-4410 https://www.cve.org/CVERecord?id=CVE-2010-4410 is related but the fix was incomplete. Impact By injecting %0A (newline) into a query string parameter, an attacker can: * Break the current HTTP header * Inject a new header or entire body * Deliver a script payload that is reflected in the server’s response That can lead to the following attacks: * reflected XSS * open redirect * cache poisoning * header manipulation Affected products CGI-Simple <1.282 Matching in nixpkgs pkgs.perlPackages.CGISimple Simple totally OO CGI interface that is CGI.pm compliant nixos-25.11 1.282 nixpkgs-25.11-darwin 1.282 nixos-unstable 1.280 nixos-unstable-small 1.280 nixpkgs-unstable 1.280 pkgs.perl538Packages.CGISimple Simple totally OO CGI interface that is CGI.pm compliant nixos-25.05 ??? nixos-25.05-small 1.280 nixos-25.11 1.282 nixpkgs-25.11-darwin 1.282 nixos-unstable 1.280 nixos-unstable-small 1.280 nixpkgs-unstable 1.280 pkgs.perl540Packages.CGISimple Simple totally OO CGI interface that is CGI.pm compliant nixos-25.05 ??? nixos-25.05-small 1.280 nixos-25.11 1.282 nixpkgs-25.11-darwin 1.282 nixos-unstable 1.280 nixos-unstable-small 1.280 nixpkgs-unstable 1.280
pkgs.perlPackages.CGISimple Simple totally OO CGI interface that is CGI.pm compliant nixos-25.11 1.282 nixpkgs-25.11-darwin 1.282 nixos-unstable 1.280 nixos-unstable-small 1.280 nixpkgs-unstable 1.280
pkgs.perl538Packages.CGISimple Simple totally OO CGI interface that is CGI.pm compliant nixos-25.05 ??? nixos-25.05-small 1.280 nixos-25.11 1.282 nixpkgs-25.11-darwin 1.282 nixos-unstable 1.280 nixos-unstable-small 1.280 nixpkgs-unstable 1.280
pkgs.perl540Packages.CGISimple Simple totally OO CGI interface that is CGI.pm compliant nixos-25.05 ??? nixos-25.05-small 1.280 nixos-25.11 1.282 nixpkgs-25.11-darwin 1.282 nixos-unstable 1.280 nixos-unstable-small 1.280 nixpkgs-unstable 1.280
CVE-2025-54725 9.8 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 days, 10 hours ago WordPress Golo Theme <= 1.7.0 - Broken Authentication Vulnerability Authentication Bypass Using an Alternate Path or Channel vulnerability in uxper Golo allows Authentication Abuse. This issue affects Golo: from n/a through 1.7.0. Affected products golo =<1.7.0 Matching in nixpkgs pkgs.ligolo-ng Tunneling/pivoting tool that uses a TUN interface nixos-25.05 ??? nixos-25.05-small 0.8.1 nixos-25.11 0.8.2 nixpkgs-25.11-darwin 0.8.2 nixos-unstable 0.8.1 nixos-unstable-small 0.8.2 nixpkgs-unstable 0.8.2 pkgs.xfce.gigolo Frontend to easily manage connections to remote filesystems nixos-25.05 ??? nixos-25.05-small 0.5.4 nixos-25.11 0.6.0 nixpkgs-25.11-darwin 0.6.0 nixos-unstable 0.5.3 nixos-unstable-small 0.6.0 nixpkgs-unstable 0.5.3 pkgs.ligolo-ng.x86_64-linux Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2 pkgs.ligolo-ng.aarch64-linux Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2 pkgs.ligolo-ng.x86_64-darwin Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2 pkgs.ligolo-ng.aarch64-darwin Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2 Package maintainers: 3 @bobby285271 Bobby Rong <rjl931189261@126.com> @romildo José Romildo Malaquias <malaquias@gmail.com> @muscaln Mustafa Çalışkan <muscaln@protonmail.com>
pkgs.ligolo-ng Tunneling/pivoting tool that uses a TUN interface nixos-25.05 ??? nixos-25.05-small 0.8.1 nixos-25.11 0.8.2 nixpkgs-25.11-darwin 0.8.2 nixos-unstable 0.8.1 nixos-unstable-small 0.8.2 nixpkgs-unstable 0.8.2
pkgs.xfce.gigolo Frontend to easily manage connections to remote filesystems nixos-25.05 ??? nixos-25.05-small 0.5.4 nixos-25.11 0.6.0 nixpkgs-25.11-darwin 0.6.0 nixos-unstable 0.5.3 nixos-unstable-small 0.6.0 nixpkgs-unstable 0.5.3
pkgs.ligolo-ng.x86_64-linux Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2
pkgs.ligolo-ng.aarch64-linux Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2
pkgs.ligolo-ng.x86_64-darwin Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2
pkgs.ligolo-ng.aarch64-darwin Tunneling/pivoting tool that uses a TUN interface nixos-unstable ??? nixos-unstable-small 0.6.2