NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute methods on client-side elements (`Element.run_method()`, `AgGrid.run_grid_method()`, `EChart.run_chart_method()`, and others) use an `eval()` fallback in the JavaScript-side `runMethod()` function. When user-controlled input is passed as the method name, an attacker can inject arbitrary JavaScript that executes in the victim's browser. Additionally, `Element.run_method()` and `Element.get_computed_prop()` used string interpolation instead of `json.dumps()` for the method/property name, allowing quote injection to break out of the intended string context. Version 3.8.0 contains a fix.
References
| Link | Resource |
|---|---|
| https://github.com/zauberzeug/nicegui/commit/1861f59cc374ca0dc9d970b157ef3774720f8dbf | Patch |
| https://github.com/zauberzeug/nicegui/security/advisories/GHSA-78qv-3mpx-9cqq | Mitigation Vendor Advisory |
Configurations
History
26 Feb 2026, 18:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zauberzeug/nicegui/commit/1861f59cc374ca0dc9d970b157ef3774720f8dbf - Patch | |
| References | () https://github.com/zauberzeug/nicegui/security/advisories/GHSA-78qv-3mpx-9cqq - Mitigation, Vendor Advisory | |
| First Time |
Zauberzeug
Zauberzeug nicegui |
|
| CPE | cpe:2.3:a:zauberzeug:nicegui:*:*:*:*:*:*:*:* |
24 Feb 2026, 18:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 18:29
Updated : 2026-02-26 18:10
NVD link : CVE-2026-27156
Mitre link : CVE-2026-27156
CVE.ORG link : CVE-2026-27156
JSON object : View
Products Affected
zauberzeug
- nicegui
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
