Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
created 1 month, 1 week ago Activity log
  • Created suggestion
NoSQL Injection via WebSocket id Parameter in MongoDB Adapter

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection. This vulnerability is fixed in 5.0.42.

Affected products

mongodb
  • ==>= 5.0.0, < 5.0.42

Matching in nixpkgs

pkgs.mongodb

Scalable, high-performance, open source NoSQL database

pkgs.mongodb-ce

MongoDB is a general purpose, document-based, distributed database.

pkgs.mongodb-6_0

Scalable, high-performance, open source NoSQL database

pkgs.mongodb-cli

MongoDB CLI enable you to manage your MongoDB via ops manager and cloud manager

created 1 month, 1 week ago Activity log
  • Created suggestion
Glances Exposes Unauthenticated Configuration Secrets

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.

Affected products

glances
  • ==< 4.5.1

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3846
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month, 1 week ago Activity log
  • Created suggestion
Same-origin policy bypass in the CSS Parsing and Computation component

Same-origin policy bypass in the CSS Parsing and Computation component. This vulnerability affects Firefox < 148.0.2.

Affected products

Firefox
  • <148.0.2

Matching in nixpkgs

pkgs.firefoxpwa

Tool to install, manage and use Progressive Web Apps (PWAs) in Mozilla Firefox (native component)

pkgs.faust2firefox

The faust2firefox script, part of faust functional programming language for realtime audio signal processing

pkgs.firefox_decrypt

Tool to extract passwords from profiles of Mozilla Firefox and derivates

pkgs.firefox-sync-client

Commandline-utility to list/view/edit/delete entries in a firefox-sync account.

pkgs.gnomeExtensions.firefox-profiles

Easily launch Firefox with your favorite profile right from the indicator menu!

  • nixos-unstable 6
    • nixpkgs-unstable 6
    • nixos-unstable-small 6
  • nixos-25.11 5
    • nixos-25.11-small 5
    • nixpkgs-25.11-darwin 5

Package maintainers

created 1 month, 1 week ago Activity log
  • Created suggestion
Istio HTTP debug endpoints on port 15014 to enforce namespace-based authorization, preventing cross-namespace proxy data access.

Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.

Affected products

istio
  • ==< 1.27.8
  • ==>= 1.28.0-alpha.0, < 1.28.5
  • ==>= 1.29.0-alpha.0, < 1.29.1

Matching in nixpkgs

pkgs.istioctl

Istio configuration command line utility for service operators to debug and diagnose their Istio mesh

Package maintainers

Permalink CVE-2026-26311
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago Activity log
  • Created suggestion
Envoy HTTP: filter chain execution on reset streams causing UAF crash

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that has already been logically reset and cleaned up. The vulnerability resides in source/common/http/filter_manager.cc within the FilterManager::decodeData method. The ActiveStream object remains valid in memory during the deferred deletion window. If a DATA frame arrives on this stream immediately after the reset (e.g., in the same packet processing cycle), the HTTP/2 codec invokes ActiveStream::decodeData, which cascades to FilterManager::decodeData. FilterManager::decodeData fails to check the saw_downstream_reset_ flag. It iterates over the decoder_filters_ list and invokes decodeData() on filters that have already received onDestroy(). This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

Affected products

envoy
  • ==>= 1.37.0, < 1.37.1
  • ==< 1.34.13
  • ==>= 1.36.0, < 1.36.5
  • ==>= 1.35.0, < 1.35.9

Matching in nixpkgs

Package maintainers

created 1 month, 1 week ago Activity log
  • Created suggestion
Craft Commerce has Stored XSS in Craft Commerce Order Details Slideout

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Craft Commerce Order details. Malicious JavaScript can be injected via the Shipping Method Name, Order Reference, or Site Name. When a user opens the order details slideout via a double-click on the order index page, the injected payload executes. This vulnerability is fixed in 4.10.2 and 5.5.3.

Affected products

commerce
  • ==>= 4.0.0 < 4.10.2
  • ==>= 5.0.0 < 5.5.3

Matching in nixpkgs

Package maintainers

created 1 month, 1 week ago Activity log
  • Created suggestion
Flare has a Path Traversal in /api/avatars/[filename]

Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to 1.7.3, an authenticated path traversal vulnerability in /api/avatars/[filename] allows any logged-in user to read arbitrary files from within the application container. The filename URL parameter is passed to path.join() without sanitization, and getFileStream() performs no path validation, enabling %2F-encoded ../ sequences to escape the uploads/avatars/ directory and read any file accessible to the nextjs process under /app/. Authentication is enforced by Next.js middleware. However, on instances with open registration enabled (the default), any attacker can self-register and immediately exploit this. This vulnerability is fixed in 1.7.3.

Affected products

Flare
  • ==< 1.7.3

Matching in nixpkgs

pkgs.flare

Fantasy action RPG using the FLARE engine

  • nixos-unstable 1.14
    • nixpkgs-unstable 1.14
    • nixos-unstable-small 1.14
  • nixos-25.11 1.14
    • nixos-25.11-small 1.14
    • nixpkgs-25.11-darwin 1.14

pkgs.photoflare

Cross-platform image editor with a powerful features and a very friendly graphical user interface

pkgs.flare-floss

Automatically extract obfuscated strings from malware

pkgs.gotlsaflare

Update TLSA DANE records on cloudflare from x509 certificates

pkgs.cloudflare-dyndns

CloudFlare Dynamic DNS client

  • nixos-unstable 5.4
    • nixpkgs-unstable 5.4
    • nixos-unstable-small 5.4
  • nixos-25.11 5.4
    • nixos-25.11-small 5.4
    • nixpkgs-25.11-darwin 5.4

Package maintainers

Permalink CVE-2026-31817
8.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 1 month, 1 week ago Activity log
  • Created suggestion
OliveTin has unsafe parsing of UniqueTrackingId can be used to write files

OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.

Affected products

OliveTin
  • ==< 3000.11.2

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-30933
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 1 week ago Activity log
  • Created suggestion
FileBrowser Quantum Incomplete Remediation of CVE-2026-27611: Password-Protected Share Bypass via /public/api/share/info

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable.

Affected products

filebrowser
  • ==>= 1.2.6-beta, < 1.2.2-stable
  • === 1.1.3-stable
  • ==>= 1.3.0-beta, < 1.3.1-beta

Matching in nixpkgs

Permalink CVE-2026-31808
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month, 1 week ago Activity log
  • Created suggestion
file-type affected by infinite loop in ASF parser on malformed input with zero-size sub-header

file-type detects the file type of a file, stream, or data. Prior to 21.3.1, a denial of service vulnerability exists in the ASF (WMV/WMA) file type detection parser. When parsing a crafted input where an ASF sub-header has a size field of zero, the parser enters an infinite loop. The payload value becomes negative (-24), causing tokenizer.ignore(payload) to move the read position backwards, so the same sub-header is read repeatedly forever. Any application that uses file-type to detect the type of untrusted/attacker-controlled input is affected. An attacker can stall the Node.js event loop with a 55-byte payload. Fixed in version 21.3.1.

Affected products

file-type
  • ==>= 13.0.0, < 21.3.1

Matching in nixpkgs

pkgs.perlPackages.FileType

Uses magic numbers (typically at the start of a file) to determine the MIME type of that file

  • nixos-unstable 0.22
    • nixpkgs-unstable 0.22
    • nixos-unstable-small 0.22
  • nixos-25.11 0.22
    • nixos-25.11-small 0.22
    • nixpkgs-25.11-darwin 0.22

pkgs.perl5Packages.FileType

Uses magic numbers (typically at the start of a file) to determine the MIME type of that file

  • nixos-unstable 0.22
    • nixpkgs-unstable 0.22
    • nixos-unstable-small 0.22

pkgs.perl538Packages.FileType

Uses magic numbers (typically at the start of a file) to determine the MIME type of that file

  • nixos-25.11 0.22
    • nixos-25.11-small 0.22
    • nixpkgs-25.11-darwin 0.22

pkgs.perl540Packages.FileType

Uses magic numbers (typically at the start of a file) to determine the MIME type of that file

  • nixos-25.11 0.22
    • nixos-25.11-small 0.22
    • nixpkgs-25.11-darwin 0.22