CVE-2023-27494

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27494
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27494.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-27494
Aliases
Related
Published
2023-03-16T21:15:13Z
Modified
2025-07-02T00:22:37.069640Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability.

References

Affected packages

Git / github.com/streamlit/streamlit

Affected ranges

Type
GIT
Repo
https://github.com/streamlit/streamlit
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.10.1
0.11.0
0.12.4
0.13.3
0.13.5
0.14.2
0.15.4
0.16.0
0.16.3
0.17.2
0.19.1
0.2.0
0.24.0
0.25.0
0.26.1
0.27.0
0.28.0
0.3.0
0.30.0
0.31.0
0.32.0
0.33.0
0.34.0
0.35.0
0.36.0
0.37.0
0.40.0
0.5.0
0.6.0
0.64.0
0.65.0
0.65.1
0.65.2
0.66.0
0.67.0
0.67.1
0.68.0
0.71.0
0.72.0
0.73.0
0.74.0
0.74.1
0.75.0
0.76.0
0.79.0
0.8.0
0.80.0
0.9.0