Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29872: n/a

0
High
VulnerabilityCVE-2026-29872cvecve-2026-29872
Published: Mon Mar 30 2026 (03/30/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 18:53:24 UTC

Technical Analysis

CVE-2026-29872 is a vulnerability identified in the awesome-llm-apps project, specifically in a Streamlit-based GitHub MCP Agent implementation. The root cause is the insecure handling of user-supplied API tokens, which are stored in the process-wide environment variables (os.environ) without proper session isolation. Streamlit applications typically run multiple concurrent users within a single Python process. Because environment variables are shared across the entire process, tokens submitted by one user remain accessible to subsequent users, regardless of authentication status. This design flaw leads to cross-session information disclosure, allowing attackers to harvest sensitive credentials such as GitHub Personal Access Tokens and LLM API keys. These tokens can be used to gain unauthorized access to private repositories, cloud services, or incur financial charges by abusing API usage. The vulnerability has a CVSS 3.1 score of 8.2 (high severity), reflecting its ease of exploitation (no privileges or user interaction required) and high confidentiality impact. Although no public exploits are known yet, the vulnerability represents a significant risk for any deployment of the affected software or similar Streamlit multi-user apps that use environment variables for sensitive data. The weakness aligns with CWE-284 (Improper Access Control), CWE-200 (Information Exposure), and CWE-522 (Insufficiently Protected Credentials).

Potential Impact

The primary impact of CVE-2026-29872 is the unauthorized disclosure of sensitive API tokens across user sessions in multi-tenant Streamlit applications. Attackers can retrieve GitHub Personal Access Tokens, enabling them to access private repositories, modify code, or exfiltrate data. Similarly, exposed LLM API keys could be abused to generate unauthorized queries, leading to financial losses or data leakage. This vulnerability compromises confidentiality severely, while integrity impact is moderate due to potential unauthorized modifications. Availability impact is minimal. The ease of exploitation without authentication or user interaction increases the risk, especially in publicly accessible deployments. Organizations relying on the affected software or similar Streamlit-based multi-user applications face risks of data breaches, intellectual property theft, and financial abuse. The vulnerability undermines trust in the application and may lead to compliance violations if sensitive data is exposed. Given the widespread use of Streamlit for rapid deployment of data science and AI applications, the scope of affected systems could be broad, particularly in organizations integrating GitHub or LLM APIs.

Mitigation Recommendations

To mitigate CVE-2026-29872, developers should avoid storing user-supplied API tokens in process-wide environment variables. Instead, implement per-session or per-user secure storage mechanisms that isolate credentials, such as in-memory session stores or encrypted databases scoped to individual users. Refactor the application to run each user session in isolated processes or containers where environment variables are not shared. Use Streamlit's session state features or external secure vaults to manage sensitive tokens safely. Additionally, enforce strict access controls and audit logging to detect unauthorized access attempts. Regularly rotate API tokens and implement least privilege principles for token scopes. For existing deployments, immediately review and revoke any potentially exposed tokens and update the application to a patched version once available. Conduct thorough security testing focusing on multi-user session isolation in Streamlit apps. Educate developers on secure credential handling best practices to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cac31de6bfc5ba1d5bec98

Added to database: 3/30/2026, 6:38:21 PM

Last enriched: 3/30/2026, 6:53:24 PM

Last updated: 3/30/2026, 9:36:16 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses