Hydra is a continuous integration service for Nix based projects. Prior to commit dea1e16, a malicious package can introduce arbitrary JavaScript code into the Hydra database that is automatically evaluated in a client's browser when anyone visits the build page. This could be done by a third-party project as part of its build process. This also happens in other places like with hydra-release-name. This issue has been patched by commit dea1e16. A workaround involves either not building untrusted packages or not visiting the builds page.
References
| Link | Resource |
|---|---|
| https://github.com/NixOS/hydra/commit/dea1e168f590efb27db32dbacc82b09e15f8ae4b | Patch |
| https://github.com/NixOS/hydra/security/advisories/GHSA-7qwg-q53v-vh99 | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2025-08-12 16:15
Updated : 2025-09-22 14:57
NVD link : CVE-2025-54800
Mitre link : CVE-2025-54800
CVE.ORG link : CVE-2025-54800
JSON object : View
Products Affected
nixos
- hydra
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
