Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-26026
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
GLPI has a Server-Side Template Injection via Double-Compilation

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.

Affected products

glpi
  • ==>= 11.0.0, < 11.0.6

Matching in nixpkgs

pkgs.glpi-agent

GLPI unified Agent for UNIX, Linux, Windows and MacOSX

  • nixos-unstable 1.16
    • nixpkgs-unstable 1.16
    • nixos-unstable-small 1.16
  • nixos-25.11 1.16
    • nixos-25.11-small 1.16
    • nixpkgs-25.11-darwin 1.16

Package maintainers

created 1 week, 4 days ago
WeGIA - Open Redirect - backup redirection — Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

created 1 week, 4 days ago
goshs has an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs PUT Upload

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.

Affected products

goshs
  • ==< 2.0.0-beta.3

Matching in nixpkgs

pkgs.goshs

Simple, yet feature-rich web server written in Go

Package maintainers

created 1 week, 4 days ago
OpenEXR: DWA Lossy Decoder Heap Out-of-Bounds Write

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, the DWA lossy decoder constructs temporary per-component block pointers using signed 32-bit arithmetic. For a large enough width, the calculation overflows and later decoder stores operate on a wrapped pointer outside the allocated rowBlock backing store. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9.

Affected products

openexr
  • ==>= 3.4.0, < 3.4.9
  • ==>= 3.2.0, < 3.2.7
  • ==>= 3.3.0, < 3.3.9

Matching in nixpkgs

pkgs.openexr

High dynamic-range (HDR) image file format

Package maintainers

created 1 week, 4 days ago
WeGIA - Open Redirect - EstoqueControle - listarTodos() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=EstoqueControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.

Affected products

WeGIA
  • ==< 3.6.9

Matching in nixpkgs

Permalink CVE-2026-35187
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 week, 4 days ago
pyLoad has SSRF in parse_urls API endpoint via unvalidated URL parameter

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validation, protocol restriction, or IP blacklist. An authenticated user with ADD permission can make HTTP/HTTPS requests to internal network resources and cloud metadata endpoints, read local files via file:// protocol (pycurl reads the file server-side), interact with internal services via gopher:// and dict:// protocols, and enumerate file existence via error-based oracle (error 37 vs empty response).

Affected products

pyload
  • ==<= 0.5.0b3.dev96

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-21372
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Heap-Based Buffer Overflow in Power Management IC

Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.

Affected products

Snapdragon
  • ==Snapdragon 460 Mobile Platform
  • ==WSA8840
  • ==FastConnect 7800
  • ==QCM6490
  • ==XG101032
  • ==Cologne
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==FastConnect 6700
  • ==WSA8845H
  • ==X2000086
  • ==WCN3988
  • ==WSA8845
  • ==WCD9370
  • ==X2000077
  • ==X2000092
  • ==FastConnect 6900
  • ==XG101002
  • ==WCN3950
  • ==WCD9378C
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCD9385
  • ==WCD9375
  • ==WCD9380
  • ==Snapdragon 662 Mobile Platform
  • ==X2000090
  • ==X2000094
  • ==XG101039
  • ==QCM5430

Matching in nixpkgs

Permalink CVE-2026-21375
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in Camera

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

Affected products

Snapdragon
  • ==Snapdragon 460 Mobile Platform
  • ==WSA8840
  • ==FastConnect 7800
  • ==QCM6490
  • ==XG101032
  • ==Cologne
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==FastConnect 6700
  • ==WSA8845H
  • ==WSA8830
  • ==WSA8835
  • ==X2000086
  • ==WCN3988
  • ==WSA8845
  • ==WCD9370
  • ==X2000077
  • ==X2000092
  • ==SC8380XP
  • ==FastConnect 6900
  • ==XG101002
  • ==Snapdragon 8cx Gen 3 Compute Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCD9378C
  • ==WCN3950
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCD9385
  • ==WCD9375
  • ==WCD9380
  • ==Snapdragon 662 Mobile Platform
  • ==X2000090
  • ==WSA8832
  • ==X2000094
  • ==QCA0000
  • ==XG101039
  • ==QCM5430

Matching in nixpkgs

created 1 week, 4 days ago
lichess.org has an Unsanitized Stream Title Injection on /streamer

lichess.org is the forever free, adless and open source chess server. Any approved streamer can inject arbitrary HTML into /streamer and the homepage “Live streams” widget by placing markup in their Twitch/YouTube stream title. CSP is present and blocks inline script execution, but the issue is still a server-side HTML injection sink. To trigger this, a Lichess account only needs to satisfy the normal streamer requirements and get approved. Per Streamer.canApply, that means an account older than 2 days with at least 15 games, or a verified/titled account. After moderator approval, once the streamer goes live, Lichess pulls the platform title and renders it into the UI as-is. No extra privileges are needed beyond a normal approved streamer profile. This vulnerability is fixed with commit 0d5002696ae705e1888bf77de107c73de57bb1b3.

Affected products

lila
  • ==< 0d5002696ae705e1888bf77de107c73de57bb1b3

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-5609
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 week, 4 days ago
Tenda i12 Parameter wifiSSIDset formwrlSSIDset stack-based overflow

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

Affected products

i12
  • ==1.0.0.11(3862)

Matching in nixpkgs