CVE-2026-29872

A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse.
References
Link Resource
https://github.com/lilmingwa13/security-research/blob/main/CVE-2026-29872.md Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:theunwindai:awesome_llm_apps:2026-01-19:*:*:*:*:*:*:*

History

06 Apr 2026, 16:00

Type Values Removed Values Added
CPE cpe:2.3:a:theunwindai:awesome_llm_apps:2026-01-19:*:*:*:*:*:*:*
References () https://github.com/lilmingwa13/security-research/blob/main/CVE-2026-29872.md - () https://github.com/lilmingwa13/security-research/blob/main/CVE-2026-29872.md - Exploit, Mitigation, Third Party Advisory
First Time Theunwindai
Theunwindai awesome Llm Apps

01 Apr 2026, 14:24

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de revelación de información entre sesiones en el proyecto awesome-llm-apps en el commit e46690f99c3f08be80a9877fab52acacf7ab8251 (19-01-2026). El agente GitHub MCP basado en Streamlit afectado almacena tokens de API proporcionados por el usuario en variables de entorno a nivel de proceso usando os.environ sin un aislamiento de sesión adecuado. Debido a que Streamlit sirve a múltiples usuarios concurrentes desde un único proceso de Python, las credenciales proporcionadas por un usuario permanecen accesibles para usuarios no autenticados posteriores. Un atacante puede explotar este problema para recuperar información sensible como Tokens de Acceso Personal de GitHub o claves de API de LLM, lo que podría llevar a un acceso no autorizado a recursos privados y abuso financiero.

30 Mar 2026, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2
CWE CWE-200
CWE-284
CWE-522

30 Mar 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-30 18:16

Updated : 2026-04-06 16:00


NVD link : CVE-2026-29872

Mitre link : CVE-2026-29872

CVE.ORG link : CVE-2026-29872


JSON object : View

Products Affected

theunwindai

  • awesome_llm_apps
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-284

Improper Access Control

CWE-522

Insufficiently Protected Credentials