Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
created 1 week, 4 days ago
WeGIA has Stored XSS in backup file names

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, a stored XSS vulnerability allows an attacker to inject malicious scripts through a backup filename. This could lead to unauthorized execution of malicious code in the victim's browser, compromising session data or executing actions on behalf of the user. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

created 1 week, 4 days ago
WeGIA - Open Redirect - IentradaControle - listarId() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

created 1 week, 4 days ago
Hugo does not properly escape some Markdown links

Hugo is a static site generator. From 0.60.0 to before 0.159.2, links and image links in the default markdown to HTML renderer are not properly escaped. Hugo users who trust their Markdown content or have custom render hooks for links and images are not affected. This vulnerability is fixed in 0.159.2.

Affected products

hugo
  • ==>= 0.60.0, < 0.159.2

Matching in nixpkgs

Permalink CVE-2026-21373
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in Camera

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

Affected products

Snapdragon
  • ==Snapdragon 460 Mobile Platform
  • ==WSA8840
  • ==FastConnect 7800
  • ==XG101032
  • ==FastConnect 6200
  • ==Cologne
  • ==QCM6490
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==WSA8810
  • ==QCA6420
  • ==FastConnect 6700
  • ==WSA8845H
  • ==Snapdragon 8cx Gen 2 5G Compute Platform
  • ==WSA8830
  • ==WSA8835
  • ==X2000086
  • ==WCN3988
  • ==WSA8815
  • ==WSA8845
  • ==SM6250
  • ==WCD9370
  • ==Snapdragon 8cx Compute Platform
  • ==WCD9341
  • ==X2000077
  • ==Snapdragon 7c Compute Platform
  • ==SC8380XP
  • ==FastConnect 6900
  • ==Snapdragon 8c Compute Platform "Poipu Lite"
  • ==Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
  • ==Snapdragon 8cx Compute Platform "Poipu Pro"
  • ==X2000092
  • ==XG101002
  • ==Snapdragon 8cx Gen 3 Compute Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCD9378C
  • ==WCN3950
  • ==QCA6391
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCD9385
  • ==WCD9375
  • ==WCD9380
  • ==Snapdragon 662 Mobile Platform
  • ==AQT1000
  • ==WSA8832
  • ==X2000090
  • ==X2000094
  • ==Snapdragon 8cx Gen 2 5G Compute Platform "Poipu Pro"
  • ==Snapdragon 7c Gen 2 Compute Platform "Rennell Pro"
  • ==WCD9340
  • ==XG101039
  • ==QCA0000
  • ==QCA6430
  • ==FastConnect 6800
  • ==QCM5430

Matching in nixpkgs

Permalink CVE-2026-35395
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
WeGIA has a SQL Injection in DespachoDAO.php via id_memorando parameter

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated into SQL queries, allowing any authenticated user to execute arbitrary SQL commands against the database. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

Permalink CVE-2026-35197
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 week, 4 days ago
Code injection in dye template expressions

dye is a portable and respectful color library for shell scripts. Prior to 1.1.1, certain dye template expressions would result in execution of arbitrary code. This issue was discovered and fixed by dye's author, and is not known to be exploited. This vulnerability is fixed in 1.1.1.

Affected products

dye
  • ==< 1.1.1

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-34778
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 week, 4 days ago
Electron: Service worker can spoof executeJavaScript IPC replies

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

Affected products

electron
  • ==>= 41.0.0-alpha.1, < 41.0.0
  • ==>= 40.0.0-alpha.1, < 40.8.1
  • ==>= 39.0.0-alpha.1, < 39.8.1
  • ==< 38.8.6

Matching in nixpkgs

pkgs.electron_35

Cross platform desktop application shell

pkgs.electron_36

Cross platform desktop application shell

pkgs.gfn-electron

Linux Desktop client for Nvidia's GeForce NOW game streaming service

pkgs.electron-mail

ElectronMail is an Electron-based unofficial desktop client for ProtonMail

Permalink CVE-2026-35209
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 week, 4 days ago
defu: Prototype pollution via `__proto__` key in defaults argument

defu is software that allows uers to assign default properties recursively. Prior to version 6.1.5, applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the first argument to `defu()` are vulnerable to prototype pollution. A crafted payload containing a `__proto__` key can override intended default values in the merged resul. The internal `_defu` function used `Object.assign({}, defaults)` to copy the defaults object. `Object.assign` invokes the `__proto__` setter, which replaces the resulting object's `[[Prototype]]` with attacker-controlled values. Properties inherited from the polluted prototype then bypass the existing `__proto__` key guard in the `for...in` loop and land in the final result. Version 6.1.5 replaces `Object.assign({}, defaults)` with object spread (`{ ...defaults }`), which uses `[[DefineOwnProperty]]` and does not invoke the `__proto__` setter.

Affected products

defu
  • ==< 6.1.5

Matching in nixpkgs

pkgs.defuddle-cli

Command line utility to extract clean html, markdown and metadata from web pages

pkgs.python312Packages.defusedcsv

Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module

pkgs.python313Packages.defusedcsv

Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module

pkgs.python314Packages.defusedcsv

Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module

Package maintainers

created 1 week, 4 days ago
WeGIA - Open Redirect - atualizacao redirection - Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

Permalink CVE-2026-34764
2.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 week, 4 days ago
Electron has a use-after-free in offscreen shared texture release() callback

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From 33.0.0-alpha.1 to before 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, apps that use offscreen rendering with GPU shared textures may be vulnerable to a use-after-free. Under certain conditions, the release() callback provided on a paint event texture can outlive its backing native state, and invoking it after that point dereferences freed memory in the main process, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering with webPreferences.offscreen: { useSharedTexture: true }. Apps that do not enable shared-texture offscreen rendering are not affected. To mitigate this issue, ensure texture.release() is called promptly after the texture has been consumed, before the texture object becomes unreachable. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5.

Affected products

electron
  • ==>= 41.0.0-alpha.1, < 41.1.0
  • ==>= 33.0.0-alpha.1, < 39.8.5
  • ==>= 40.0.0-alpha.1, < 40.8.5
  • ==>= 42.0.0-alpha.1, < 42.0.0-alpha.5

Matching in nixpkgs

pkgs.electron_35

Cross platform desktop application shell

pkgs.electron_36

Cross platform desktop application shell

pkgs.gfn-electron

Linux Desktop client for Nvidia's GeForce NOW game streaming service

pkgs.electron-mail

ElectronMail is an Electron-based unofficial desktop client for ProtonMail