Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33332: CWE-20: Improper Input Validation in zauberzeug nicegui

0
Medium
VulnerabilityCVE-2026-33332cvecve-2026-33332cwe-20cwe-770
Published: Tue Mar 24 2026 (03/24/2026, 19:20:53 UTC)
Source: CVE Database V5
Vendor/Project: zauberzeug
Product: nicegui

Description

CVE-2026-33332 is a medium-severity vulnerability in the Python-based UI framework NiceGUI versions prior to 3. 9. 0. It involves improper input validation of a user-controlled query parameter in the app. add_media_file() and app. add_media_files() routes. This parameter affects how files are read during streaming, allowing attackers to bypass chunked streaming and force the server to load entire media files into memory simultaneously. Exploiting this can cause excessive memory consumption, degraded performance, or denial of service, especially with large files and concurrent requests. No authentication or user interaction is required to exploit this vulnerability. The issue has been patched in NiceGUI version 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:14:28 UTC

Technical Analysis

CVE-2026-33332 is a vulnerability classified under CWE-20 (Improper Input Validation) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the NiceGUI Python UI framework before version 3.9.0. The flaw exists in the media streaming functionality exposed via app.add_media_file() and app.add_media_files() routes, which accept a user-controlled query parameter that dictates how media files are read and streamed. This parameter is passed directly to the range-response implementation without proper validation or limits, enabling an attacker to bypass the intended chunked streaming mechanism. Instead of streaming files in manageable chunks, the server is forced to load entire media files into memory at once. When large media files are targeted, especially under concurrent request conditions, this can lead to excessive memory consumption, causing degraded server performance or denial of service due to resource exhaustion. The vulnerability requires no authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the vulnerability has a CVSS 4.0 base score of 6.9, reflecting a medium severity level. The issue was addressed and patched in NiceGUI version 3.9.0, which implements proper validation and resource management to prevent this memory exhaustion attack vector.

Potential Impact

The primary impact of CVE-2026-33332 is denial of service through resource exhaustion. Attackers can exploit the improper input validation to force the server to load entire large media files into memory simultaneously, potentially overwhelming system resources. This can degrade application performance, cause crashes, or render the service unavailable to legitimate users. Organizations relying on NiceGUI for media streaming in their applications may face service disruptions, impacting user experience and operational continuity. The vulnerability does not directly expose data confidentiality or integrity but can indirectly affect availability, which is critical for business operations. High concurrency scenarios exacerbate the risk, making large-scale or automated attacks more damaging. Since no authentication is required, any remote attacker with network access to the affected routes can exploit this vulnerability, increasing the attack surface. This can be particularly problematic for public-facing applications or services with large media content.

Mitigation Recommendations

To mitigate CVE-2026-33332, organizations should upgrade NiceGUI to version 3.9.0 or later, where the vulnerability is patched with proper input validation and resource management. Until upgrading, implement strict network-level access controls to restrict access to the media streaming routes to trusted users or internal networks only. Employ web application firewalls (WAFs) to detect and block abnormal query parameters or unusually large range requests targeting media endpoints. Monitor server memory usage and set resource limits or quotas for media streaming processes to prevent resource exhaustion. Consider implementing rate limiting or concurrency controls on media file requests to reduce the risk of simultaneous large file loads. Review application logs for suspicious access patterns to media routes and establish alerting for potential exploitation attempts. Finally, conduct security testing and code reviews focusing on input validation and resource allocation in custom extensions or integrations with NiceGUI.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2ea08f4197a8e3b6b642e

Added to database: 3/24/2026, 7:46:16 PM

Last enriched: 3/31/2026, 8:14:28 PM

Last updated: 5/8/2026, 9:28:42 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses