Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: python312Packages.pygitguardian

Found 4 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2025-40899
8.9 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 3 days ago Activity log
  • Created suggestion
Stored Cross-Site Scripting (XSS) in Assets and Nodes in Guardian/CMC before 26.0.0

A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality due to improper validation of an input parameter. An authenticated user with custom fields privileges can define a malicious custom field containing a JavaScript payload. When the victim views the Assets or Nodes pages, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information.

Affected products

CMC
  • <26.0.0
Guardian
  • <26.0.0

Matching in nixpkgs

pkgs.cmc

Manages SSH ControlMaster sessions

pkgs.cmctl

Command line utility to interact with a cert-manager instalation on Kubernetes

pkgs.scmccid

PCSC drivers for linux, for the SCM SCR3310 v2.0 card and others

pkgs.adguardian

Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance

pkgs.pcmciaUtils

None

  • nixos-unstable 018
    • nixpkgs-unstable 018
    • nixos-unstable-small 018
  • nixos-25.11 018
    • nixos-25.11-small 018
    • nixpkgs-25.11-darwin 018

pkgs.pcmciautils

None

  • nixos-unstable 018
    • nixpkgs-unstable 018
    • nixos-unstable-small 018
  • nixos-25.11 018
    • nixos-25.11-small 018
    • nixpkgs-25.11-darwin 018

Package maintainers

Untriaged
Permalink CVE-2025-40897
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 3 days ago Activity log
  • Created suggestion
Incorrect authorization for Threat Intelligence in Guardian/CMC before 26.0.0

An access control vulnerability was discovered in the Threat Intelligence functionality due to a specific access restriction not being properly enforced for users with view-only privileges. An authenticated user with view-only privileges for the Threat Intelligence functionality can perform administrative actions on it, altering the rules configuration, and/or affecting their availability.

Affected products

CMC
  • <26.0.0
Guardian
  • <26.0.0

Matching in nixpkgs

pkgs.cmc

Manages SSH ControlMaster sessions

pkgs.cmctl

Command line utility to interact with a cert-manager instalation on Kubernetes

pkgs.scmccid

PCSC drivers for linux, for the SCM SCR3310 v2.0 card and others

pkgs.adguardian

Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance

pkgs.pcmciaUtils

None

  • nixos-unstable 018
    • nixpkgs-unstable 018
    • nixos-unstable-small 018
  • nixos-25.11 018
    • nixos-25.11-small 018
    • nixpkgs-25.11-darwin 018

pkgs.pcmciautils

None

  • nixos-unstable 018
    • nixpkgs-unstable 018
    • nixos-unstable-small 018
  • nixos-25.11 018
    • nixos-25.11-small 018
    • nixpkgs-25.11-darwin 018

Package maintainers

Untriaged
Permalink CVE-2026-39911
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 weeks, 2 days ago Activity log
  • Created suggestion
Hashgraph Guardian 3.5.0 Unsandboxed JavaScript Execution RCE

Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript execution vulnerability in the Custom Logic policy block worker that allows authenticated Standard Registry users to execute arbitrary code by passing user-supplied JavaScript expressions directly to the Node.js Function() constructor without isolation. Attackers can import native Node.js modules to read arbitrary files from the container filesystem, access process environment variables containing sensitive credentials such as RSA private keys, JWT signing keys, and API tokens, and forge valid authentication tokens for any user including administrators.

Affected products

guardian
  • =<3.5.0

Matching in nixpkgs

pkgs.adguardian

Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance

Package maintainers

Untriaged
Permalink CVE-2025-40894
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 month, 3 weeks ago Activity log
  • Created suggestion
HTML injection in Alerted Nodes Dashboard in Guardian/CMC before 25.6.0

A Stored HTML Injection vulnerability was discovered in the Alerted Nodes Dashboard functionality due to improper validation on an input parameter. A malicious authenticated user with the required privileges could edit a node label to inject HTML tags. If the system is configured to use the Alerted Nodes Dashboard, and alerts are reported for the affected node, then the injected HTML may render in the browser of a victim user interacting with it, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.

Affected products

CMC
  • <25.6.0
Guardian
  • <25.6.0

Matching in nixpkgs

pkgs.cmctl

Command line utility to interact with a cert-manager instalation on Kubernetes

pkgs.scmccid

PCSC drivers for linux, for the SCM SCR3310 v2.0 card and others

pkgs.adguardian

Terminal-based, real-time traffic monitoring and statistics for your AdGuard Home instance

pkgs.pcmciaUtils

None

  • nixos-unstable 018
    • nixpkgs-unstable 018
    • nixos-unstable-small 018
  • nixos-25.11 018
    • nixos-25.11-small 018
    • nixpkgs-25.11-darwin 018

Package maintainers