CVE-2026-27156

NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute methods on client-side elements (`Element.run_method()`, `AgGrid.run_grid_method()`, `EChart.run_chart_method()`, and others) use an `eval()` fallback in the JavaScript-side `runMethod()` function. When user-controlled input is passed as the method name, an attacker can inject arbitrary JavaScript that executes in the victim's browser. Additionally, `Element.run_method()` and `Element.get_computed_prop()` used string interpolation instead of `json.dumps()` for the method/property name, allowing quote injection to break out of the intended string context. Version 3.8.0 contains a fix.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zauberzeug:nicegui:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-24 18:29

Updated : 2026-02-26 18:10


NVD link : CVE-2026-27156

Mitre link : CVE-2026-27156

CVE.ORG link : CVE-2026-27156


JSON object : View

Products Affected

zauberzeug

  • nicegui
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')