Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33332: CWE-20: Improper Input Validation in zauberzeug nicegui

0
Medium
VulnerabilityCVE-2026-33332cvecve-2026-33332cwe-20cwe-770
Published: Tue Mar 24 2026 (03/24/2026, 19:20:53 UTC)
Source: CVE Database V5
Vendor/Project: zauberzeug
Product: nicegui

Description

CVE-2026-33332 is a medium severity vulnerability in the Python-based UI framework NiceGUI versions prior to 3. 9. 0. The flaw exists in the app. add_media_file() and app. add_media_files() routes, which accept a user-controlled query parameter that influences file reading during streaming. Due to improper input validation, attackers can bypass chunked streaming and force the server to load entire media files into memory simultaneously. This can cause excessive memory consumption, degraded performance, or denial of service, especially with large files and concurrent requests. No authentication or user interaction is required to exploit this vulnerability. It has been patched in version 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 20:02:20 UTC

Technical Analysis

CVE-2026-33332 is a vulnerability in the NiceGUI framework, a Python-based UI toolkit, affecting versions prior to 3.9.0. The issue arises from improper input validation (CWE-20) in the handling of user-supplied query parameters in the app.add_media_file() and app.add_media_files() media routes. These parameters control how media files are read during HTTP streaming responses. Specifically, the parameter is passed unchecked to the range-response implementation, allowing attackers to bypass the intended chunked streaming mechanism. Instead of streaming media files in manageable chunks, the server is forced to load entire files into memory at once. This behavior can lead to excessive memory consumption, which under conditions of large media files and multiple concurrent requests, may degrade server performance or cause denial of service (CWE-770). The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The issue was publicly disclosed and assigned CVE-2026-33332 with a CVSS 4.0 base score of 6.9 (medium severity). The vulnerability has been addressed in NiceGUI version 3.9.0 by validating input parameters to prevent bypassing chunked streaming. No known exploits have been reported in the wild to date.

Potential Impact

The primary impact of this vulnerability is on availability and performance of systems running vulnerable NiceGUI versions. Attackers can exploit the flaw to cause excessive memory consumption by forcing the server to load entire large media files into memory simultaneously. This can degrade server responsiveness, increase latency, and potentially cause denial of service conditions, especially under high concurrency. Organizations relying on NiceGUI for media streaming in web applications may experience service outages or degraded user experience. While confidentiality and integrity are not directly impacted, the availability disruption can affect business continuity and user trust. The vulnerability is remotely exploitable without authentication, increasing the attack surface. Systems with limited memory resources or those serving large media files are at higher risk. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent potential abuse.

Mitigation Recommendations

1. Upgrade NiceGUI to version 3.9.0 or later, where the vulnerability is patched with proper input validation to prevent bypassing chunked streaming. 2. Implement strict input validation and sanitization on all user-controlled parameters related to media streaming, even beyond the framework's built-in protections. 3. Employ rate limiting and request throttling on media routes to reduce the risk of resource exhaustion from concurrent requests. 4. Monitor server memory usage and set alerts for abnormal spikes that could indicate exploitation attempts. 5. Use web application firewalls (WAFs) to detect and block suspicious query parameters or unusually large streaming requests. 6. Conduct regular security assessments and code reviews focusing on input validation and resource management in media handling components. 7. Isolate media streaming services in containers or separate environments with resource limits to contain potential impact. 8. Educate developers on secure coding practices related to streaming and input validation to prevent similar issues in future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2ea08f4197a8e3b6b642e

Added to database: 3/24/2026, 7:46:16 PM

Last enriched: 3/24/2026, 8:02:20 PM

Last updated: 3/24/2026, 9:01:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses