CVE-2023-27494

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27494
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27494.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-27494
Aliases
Published
2023-03-16T20:29:17Z
Modified
2025-11-04T19:32:01Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N CVSS Calculator
Summary
Streamlit Cross-site Scripting vulnerability
Details

Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/streamlit/streamlit

Affected ranges

Type
GIT
Repo
https://github.com/streamlit/streamlit
Events