| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-78qv-3mpx-9cqq | NiceGUI vulnerable to XSS via Code Injection during client-side element function execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zauberzeug:nicegui:*:*:*:*:*:*:*:* |
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zauberzeug
Zauberzeug nicegui |
|
| Vendors & Products |
Zauberzeug
Zauberzeug nicegui |
Tue, 24 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute methods on client-side elements (`Element.run_method()`, `AgGrid.run_grid_method()`, `EChart.run_chart_method()`, and others) use an `eval()` fallback in the JavaScript-side `runMethod()` function. When user-controlled input is passed as the method name, an attacker can inject arbitrary JavaScript that executes in the victim's browser. Additionally, `Element.run_method()` and `Element.get_computed_prop()` used string interpolation instead of `json.dumps()` for the method/property name, allowing quote injection to break out of the intended string context. Version 3.8.0 contains a fix. | |
| Title | NiceGUI has XSS via Code Injection | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T21:33:40.507Z
Reserved: 2026-02-18T00:18:53.962Z
Link: CVE-2026-27156
Updated: 2026-02-26T21:06:45.535Z
Status : Analyzed
Published: 2026-02-24T18:29:33.490
Modified: 2026-02-26T18:10:00.633
Link: CVE-2026-27156
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:38:36Z
Github GHSA