Vulnerability Description
NiceGUI is a Python-based UI framework. From versions v2.10.0 to 3.4.1, an unauthenticated attacker can exhaust Redis connections by repeatedly opening and closing browser tabs on any NiceGUI application using Redis-backed storage. Connections are never released, leading to service degradation when Redis hits its connection limit. NiceGUI continues accepting new connections - errors are logged but the app stays up with broken storage functionality. This issue has been patched in version 3.5.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zauberzeug | Nicegui | >= 2.10.0, < 3.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/zauberzeug/nicegui/commit/6c52eb2c90c4b67387c025b29646b4bc157Patch
- https://github.com/zauberzeug/nicegui/releases/tag/v3.5.0Release Notes
- https://github.com/zauberzeug/nicegui/security/advisories/GHSA-mp55-g7pj-rvm2ExploitVendor Advisory
- https://github.com/zauberzeug/nicegui/security/advisories/GHSA-mp55-g7pj-rvm2ExploitVendor Advisory
FAQ
What is CVE-2026-21874?
CVE-2026-21874 is a vulnerability with a CVSS score of 5.3 (MEDIUM). NiceGUI is a Python-based UI framework. From versions v2.10.0 to 3.4.1, an unauthenticated attacker can exhaust Redis connections by repeatedly opening and closing browser tabs on any NiceGUI applicat...
How severe is CVE-2026-21874?
CVE-2026-21874 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-21874?
Check the references section above for vendor advisories and patch information. Affected products include: Zauberzeug Nicegui.