Vulnerability Description
Hydra is a continuous integration service for Nix based projects. Prior to commit dea1e16, a malicious package can introduce arbitrary JavaScript code into the Hydra database that is automatically evaluated in a client's browser when anyone visits the build page. This could be done by a third-party project as part of its build process. This also happens in other places like with hydra-release-name. This issue has been patched by commit dea1e16. A workaround involves either not building untrusted packages or not visiting the builds page.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nixos | Hydra | < 2025-08-12 |
Related Weaknesses (CWE)
References
- https://github.com/NixOS/hydra/commit/dea1e168f590efb27db32dbacc82b09e15f8ae4bPatch
- https://github.com/NixOS/hydra/security/advisories/GHSA-7qwg-q53v-vh99PatchVendor Advisory
FAQ
What is CVE-2025-54800?
CVE-2025-54800 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Hydra is a continuous integration service for Nix based projects. Prior to commit dea1e16, a malicious package can introduce arbitrary JavaScript code into the Hydra database that is automatically eva...
How severe is CVE-2025-54800?
CVE-2025-54800 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-54800?
Check the references section above for vendor advisories and patch information. Affected products include: Nixos Hydra.