Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-25121
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 2 months, 2 weeks ago Activity log
  • Created suggestion
apko is vulnerable to path traversal in apko dirFS which allows filesystem writes outside base

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, a path traversal vulnerability was discovered in apko's dirFS filesystem abstraction. An attacker who can supply a malicious APK package (e.g., via a compromised or typosquatted repository) could create directories or symlinks outside the intended installation root. The MkdirAll, Mkdir, and Symlink methods in pkg/apk/fs/rwosfs.go use filepath.Join() without validating that the resulting path stays within the base directory. This issue has been patched in version 1.1.1.

Affected products

apko
  • ==>= 0.14.8, < 1.1.1

Matching in nixpkgs

pkgs.apko

Build OCI images using APK directly without Dockerfile

  • nixos-unstable -
  • nixos-25.11 0.30.22

Package maintainers

Permalink CVE-2019-25276
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 2 weeks ago Activity log
  • Created suggestion
Studio 5000 Logix Designer 30.01.00 - 'FactoryTalk Activation Service' Unquoted Service Path

Studio 5000 Logix Designer 30.01.00 contains an unquoted service path vulnerability in the FactoryTalk Activation Service that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\Rockwell Software\FactoryTalk Activation\ to inject malicious code that would execute with LocalSystem permissions.

Affected products

Studio
  • ==5000

Matching in nixpkgs

pkgs.lmstudio

LM Studio is an easy to use desktop app for experimenting with local and open-source Large Language Models (LLMs)

pkgs.texstudio

TeX and LaTeX editor

  • nixos-unstable -
  • nixos-25.11 4.9.0

pkgs.obs-studio

Free and open source software for video recording and live streaming

  • nixos-unstable -
  • nixos-25.11 32.0.1

pkgs.sql-studio

SQL Database Explorer [SQLite, libSQL, PostgreSQL, MySQL/MariaDB, ClickHouse, Microsoft SQL Server]

  • nixos-unstable -
  • nixos-25.11 0.1.45

pkgs.zmk-studio

Tool for runtime keymap updates on ZMK-powered devices without reflashing firmware

  • nixos-unstable -

pkgs.realm-studio

Visual tool to view, edit, and model Realm databases.

  • nixos-unstable -
  • nixos-25.11 15.2.1

pkgs.sqlitestudio

Free, open source, multi-platform SQLite database manager

  • nixos-unstable -
  • nixos-25.11 3.4.17

pkgs.cherry-studio

Desktop client that supports for multiple LLM providers

  • nixos-unstable -
  • nixos-25.11 1.6.7

pkgs.lutgen-studio

Official GUI for Lutgen, the best way to apply popular colorschemes to any image or wallpaper

  • nixos-unstable -
  • nixos-25.11 0.3.0

pkgs.azuredatastudio

Data management tool that enables working with SQL Server, Azure SQL DB and SQL DW

  • nixos-unstable -
  • nixos-25.11 1.49.1

pkgs.beekeeper-studio

Modern and easy to use SQL client for MySQL, Postgres, SQLite, SQL Server, and more

  • nixos-unstable -
  • nixos-25.11 5.3.4

pkgs.sourcepawn-studio

LSP implementation for the SourcePawn programming language written in Rust

  • nixos-unstable -
  • nixos-25.11 8.1.8

pkgs.cups-toshiba-estudio

Printer only driver for the Toshiba e-STUDIO class of printers

  • nixos-unstable -
    • nixpkgs-unstable 7.89
  • nixos-25.11 7.89

pkgs.sqlitestudio-plugins

Official plugins for SQLiteStudio, a free, open source, multi-platform SQLite database manager

  • nixos-unstable -
  • nixos-25.11 3.4.17

Package maintainers

created 2 months, 2 weeks ago Activity log
  • Created suggestion
n8n Improper CSP Enforcement in Webhook Responses May Allow Stored XSS

n8n is an open source workflow automation platform. Prior to version 1.123.2, a Cross-Site Scripting (XSS) vulnerability has been identified in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox protection intended to isolate HTML responses may not be applied correctly. An authenticated user with permission to create or modify workflows could abuse this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in version 1.123.2.

Affected products

n8n
  • ==< 1.123.2

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

  • nixos-unstable -
  • nixos-25.11 1.120.4

pkgs.n8n-nodes-carbonejs

n8n community node for rendering Word templates using Carbone.js

  • nixos-unstable -

Package maintainers

Permalink CVE-2026-22044
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 2 weeks ago Activity log
  • Created suggestion
GLPI is Vulnerable to Authenticated SQL Injection

GLPI is a free asset and IT management software package. From version 0.85 to before 10.0.23, an authenticated user can perform a SQL injection. This issue has been patched in version 10.0.23.

Affected products

glpi
  • ==>= 0.85, < 10.0.23

Matching in nixpkgs

pkgs.glpi-agent

GLPI unified Agent for UNIX, Linux, Windows and MacOSX

  • nixos-unstable -
    • nixpkgs-unstable 1.15
  • nixos-25.11 1.15

Package maintainers

Permalink CVE-2026-24844
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 2 months, 2 weeks ago Activity log
  • Created suggestion
melange pipeline working-directory could allow command injection

melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses ${{vars.*}} or ${{inputs.*}} substitutions in working-directory. The field is embedded into shell scripts without proper quote escaping. This issue has been patched in version 0.40.3.

Affected products

melange
  • ==>= 0.3.0, < 0.40.3

Matching in nixpkgs

pkgs.melange

Build APKs from source code

  • nixos-unstable -
  • nixos-25.11 0.31.8

Package maintainers

Permalink CVE-2026-25532
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 2 months, 2 weeks ago Activity log
  • Created suggestion
ESF-IDF is Vulnerable to WPS Enrollee Fragment Integer Underflow

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a vulnerability exists in the WPS (Wi-Fi Protected Setup) Enrollee implementation where malformed EAP-WSC packets with truncated payloads can cause integer underflow during fragment length calculation. When processing EAP-Expanded (WSC) messages, the code computes frag_len by subtracting header sizes from the total packet length. If an attacker sends a packet where the EAP Length field covers only the header and flags but omits the expected payload (such as the 2-byte Message Length field when WPS_MSG_FLAG_LEN is set), frag_len becomes negative. This negative value is then implicitly cast to size_t when passed to wpabuf_put_data(), resulting in a very large unsigned value. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.

Affected products

esp-idf
  • === 5.3.4
  • === 5.1.6
  • === 5.4.3
  • === 5.2.6
  • === 5.5.2

Matching in nixpkgs

Package maintainers

created 2 months, 2 weeks ago Activity log
  • Created suggestion
n8n Vulnerable to Command Injection in Community Package Installation

n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3.

Affected products

n8n
  • ==>= 0.187.0, < 1.120.3

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

  • nixos-unstable -
  • nixos-25.11 1.120.4

pkgs.n8n-nodes-carbonejs

n8n community node for rendering Word templates using Carbone.js

  • nixos-unstable -

Package maintainers

Permalink CVE-2026-23624
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 2 weeks ago Activity log
  • Created suggestion
GLPI is vulnerable to session stealing on externally authenticated user change

GLPI is a free asset and IT management software package. In versions starting from 0.71 to before 10.0.23 and before 11.0.5, when remote authentication is used, based on SSO variables, a user can steal a GLPI session previously opened by another user on the same machine. This issue has been patched in versions .

Affected products

glpi
  • ==>= 11.0.0-alpha, < 11.0.5
  • ==>= 0.71, < 10.0.23

Matching in nixpkgs

pkgs.glpi-agent

GLPI unified Agent for UNIX, Linux, Windows and MacOSX

  • nixos-unstable -
    • nixpkgs-unstable 1.15
  • nixos-25.11 1.15

Package maintainers

created 2 months, 2 weeks ago Activity log
  • Created suggestion
RIOT Vulnerable to Multiple Out-of-Bounds Read When Processing Received 6LoWPAN SFR Fragments

RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. In version 2025.10 and prior, multiple out-of-bounds read allow any unauthenticated user, with ability to send or manipulate input packets, to read adjacent memory locations, or crash a vulnerable device running the 6LoWPAN stack. The received packet is cast into a sixlowpan_sfr_rfrag_t struct and dereferenced without validating the packet is large enough to contain the struct object. At time of publication, no known patch exists.

Affected products

RIOT
  • ==<= 2025.10

Matching in nixpkgs

pkgs.aisleriot

Collection of patience games written in guile scheme

pkgs.superiotool

User-space utility to detect Super I/O of a mainboard and provide detailed information about the register contents of the Super I/O

  • nixos-unstable -
  • nixos-25.11 25.09

Package maintainers

Permalink CVE-2026-25540
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 2 months, 2 weeks ago Activity log
  • Created suggestion
Mastodon's signature-dependent ActivityPub collection responses cached under signature-independent keys (Web Cache Poisoning via `Rails.cache`)

Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.3.19, 4.4.13, 4.5.6, Mastodon is vulnerable to web cache poisoning via `Rails.cache. When AUTHORIZED_FETCH is enabled, the ActivityPub endpoints for pinned posts and featured hashtags have contents that depend on the account that signed the HTTP request. However, these contents are stored in an internal cache and reused with no regards to the signing actor. As a result, an empty response generated for a blocked user account may be served to requests from legitimate non-blocked actors, or conversely, content intended for non-blocked actors may be returned to blocked actors. This issue has been patched in versions 4.3.19, 4.4.13, 4.5.6.

Affected products

mastodon
  • ==< 4.5.6
  • ==< 4.4.13
  • ==< 4.3.19

Matching in nixpkgs

pkgs.mastodon

Self-hosted, globally interconnected microblogging software based on ActivityPub

  • nixos-unstable -
  • nixos-25.11 4.5.3

pkgs.mastodon-bot

Bot to publish twitter, tumblr or rss posts to an mastodon account.

Package maintainers