Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66645: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zauberzeug nicegui

0
High
VulnerabilityCVE-2025-66645cvecve-2025-66645cwe-22
Published: Tue Dec 09 2025 (12/09/2025, 21:41:32 UTC)
Source: CVE Database V5
Vendor/Project: zauberzeug
Product: nicegui

Description

NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.

AI-Powered Analysis

AILast updated: 12/16/2025, 22:10:45 UTC

Technical Analysis

CVE-2025-66645 is a path traversal vulnerability classified under CWE-22 affecting the NiceGUI Python UI framework, specifically versions 3.3.1 and earlier. The vulnerability resides in the App.add_media_files() function, which fails to properly restrict pathname inputs to a designated directory. This improper limitation allows a remote attacker to craft requests that traverse directories on the server filesystem, enabling unauthorized reading of arbitrary files. Exploitation requires no authentication or user interaction and can be performed remotely over the network, increasing the attack surface. The vulnerability compromises confidentiality by exposing sensitive files such as configuration files, credentials, or other critical data stored on the server. The flaw does not impact integrity or availability directly but poses a significant risk due to potential information disclosure. The vendor has addressed this issue in version 3.4.0 by implementing proper input validation and directory restriction controls. Although no exploits have been observed in the wild yet, the vulnerability’s characteristics make it a likely target for attackers seeking to gather intelligence or escalate attacks. The CVSS v3.1 base score of 7.5 reflects the vulnerability’s high impact and low complexity of exploitation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to data confidentiality, particularly for entities using NiceGUI in web applications or internal tools. Exposure of sensitive files could lead to leakage of intellectual property, user credentials, or system configuration details, potentially facilitating further attacks such as privilege escalation or lateral movement. Industries with high regulatory requirements around data protection, including finance, healthcare, and government sectors, face increased compliance risks if such data is exposed. The ease of remote exploitation without authentication means attackers can operate stealthily and at scale. Additionally, organizations relying on NiceGUI for customer-facing applications risk reputational damage if breaches occur. The vulnerability’s presence in open-source frameworks also raises concerns about supply chain security, as many European companies integrate such components into their software stacks.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of NiceGUI to version 3.4.0 or later, where the vulnerability is fixed. Organizations should audit their software inventories to identify deployments of affected NiceGUI versions. For environments where immediate upgrading is not feasible, implementing strict network segmentation and access controls to limit exposure of the NiceGUI service can reduce risk. Web application firewalls (WAFs) can be configured to detect and block path traversal patterns targeting the add_media_files() endpoint. Additionally, monitoring server logs for unusual file access patterns or directory traversal attempts can provide early detection of exploitation attempts. Developers should review and harden input validation routines in custom code interacting with NiceGUI. Finally, organizations should incorporate this vulnerability into their incident response plans and ensure timely patch management processes are in place to address similar future risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-05T20:23:19.595Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69389a31d4eb7e5ad778aab6

Added to database: 12/9/2025, 9:52:49 PM

Last enriched: 12/16/2025, 10:10:45 PM

Last updated: 2/6/2026, 9:12:59 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats