NiceGUI is vulnerable to XSS via Unescaped URL in ui.navigate.history.push() / replace()
Description
NiceGUI is a Python-based UI framework. From versions 2.13.0 to 3.4.1, there is a XSS risk in NiceGUI when developers pass attacker-controlled strings into ui.navigate.history.push() or ui.navigate.history.replace(). These helpers are documented as History API wrappers for updating the browser URL without page reload. However, if the URL argument is embedded into generated JavaScript without proper escaping, a crafted payload can break out of the intended string context and execute arbitrary JavaScript in the victim’s browser. Applications that do not pass untrusted input into ui.navigate.history.push/replace are not affected. This issue has been patched in version 3.5.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
niceguiPyPI | >= 2.13.0, < 3.5.0 | 3.5.0 |
Affected products
1- Range: v2.13.0, v2.14.0, v2.14.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-7grm-h62g-5m97ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-21871ghsaADVISORY
- github.com/zauberzeug/nicegui/releases/tag/v3.5.0ghsax_refsource_MISCWEB
- github.com/zauberzeug/nicegui/security/advisories/GHSA-7grm-h62g-5m97ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.