Home

Description

NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute methods on client-side elements (`Element.run_method()`, `AgGrid.run_grid_method()`, `EChart.run_chart_method()`, and others) use an `eval()` fallback in the JavaScript-side `runMethod()` function. When user-controlled input is passed as the method name, an attacker can inject arbitrary JavaScript that executes in the victim's browser. Additionally, `Element.run_method()` and `Element.get_computed_prop()` used string interpolation instead of `json.dumps()` for the method/property name, allowing quote injection to break out of the intended string context. Version 3.8.0 contains a fix.

PUBLISHED Reserved 2026-02-18 | Published 2026-02-24 | Updated 2026-02-24 | Assigner GitHub_M




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 3.8.0
affected

References

github.com/...icegui/security/advisories/GHSA-78qv-3mpx-9cqq

github.com/...ommit/1861f59cc374ca0dc9d970b157ef3774720f8dbf

cve.org (CVE-2026-27156)

nvd.nist.gov (CVE-2026-27156)

Download JSON