Vulnerability Description
NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute methods on client-side elements (`Element.run_method()`, `AgGrid.run_grid_method()`, `EChart.run_chart_method()`, and others) use an `eval()` fallback in the JavaScript-side `runMethod()` function. When user-controlled input is passed as the method name, an attacker can inject arbitrary JavaScript that executes in the victim's browser. Additionally, `Element.run_method()` and `Element.get_computed_prop()` used string interpolation instead of `json.dumps()` for the method/property name, allowing quote injection to break out of the intended string context. Version 3.8.0 contains a fix.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zauberzeug | Nicegui | < 3.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/zauberzeug/nicegui/commit/1861f59cc374ca0dc9d970b157ef3774720Patch
- https://github.com/zauberzeug/nicegui/security/advisories/GHSA-78qv-3mpx-9cqqMitigationVendor Advisory
FAQ
What is CVE-2026-27156?
CVE-2026-27156 is a vulnerability with a CVSS score of 6.1 (MEDIUM). NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute methods on client-side elements (`Element.run_method()`, `AgGrid.run_grid_method()`, `EChart.run_chart...
How severe is CVE-2026-27156?
CVE-2026-27156 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27156?
Check the references section above for vendor advisories and patch information. Affected products include: Zauberzeug Nicegui.