Cyber Posture

CVE-2026-25732

HighPublic PoC

Published: 06 February 2026

Published
06 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0138 80.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25732 is a high-severity Path Traversal (CWE-22) vulnerability in Zauberzeug Nicegui. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 19.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates validation and sanitization of client-supplied filenames at input points to block path traversal sequences like ../ in NiceGUI FileUpload.name usage.

prevent

Requires timely identification, reporting, and remediation of the path traversal flaw in NiceGUI versions prior to 3.7.0 through patching and testing.

prevent

Employs least privilege to restrict the application process's write access to only intended upload directories, limiting damage from successful path traversal file writes.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Path traversal in public-facing NiceGUI web framework directly enables T1190 exploitation via crafted uploads; arbitrary file write facilitates T1505.003 web shell placement for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious filenames containing ../ sequences allow attackers to write files outside…

more

intended directories, with potential for remote code execution through application file overwrites in vulnerable deployment patterns. This design creates a prevalent security footgun affecting applications following common community patterns. Note: Exploitation requires application code incorporating file.name into filesystem paths without sanitization. Applications using fixed paths, generated filenames, or explicit sanitization are not affected. This vulnerability is fixed in 3.7.0.

Deeper analysisAI

CVE-2026-25732 is a path traversal vulnerability (CWE-22) in NiceGUI, a Python-based UI framework, affecting versions prior to 3.7.0. The issue stems from the FileUpload.name property, which exposes unsanitized client-supplied filename metadata. When developers construct filesystem paths using the common pattern UPLOAD_DIR / file.name, this allows malicious filenames containing ../ sequences to traverse directories and write files outside the intended upload location.

Unauthenticated attackers (AV:N/AC:L/PR:N) can exploit this vulnerability by uploading files with crafted names if the target application incorporates file.name directly into filesystem paths without additional sanitization. Successful exploitation enables arbitrary file writes outside designated directories, potentially leading to remote code execution by overwriting application files in vulnerable deployment configurations. Applications that use fixed paths, generate unique filenames, or implement explicit sanitization are not affected.

The vulnerability is fixed in NiceGUI version 3.7.0. The official security advisory (GHSA-9ffm-fxg3-xrhh) and relevant code changes in nicegui/elements/upload_files.py detail the patch and recommend developers upgrade immediately while reviewing file handling patterns to avoid direct use of client-supplied filenames in paths.

Details

CWE(s)

Affected Products

zauberzeug
nicegui
≤ 3.7.0

CVEs Like This One

CVE-2026-21873Same product: Zauberzeug Nicegui
CVE-2026-39844Same product: Zauberzeug Nicegui
CVE-2026-33332Same product: Zauberzeug Nicegui
CVE-2026-34414Shared CWE-22
CVE-2026-36760Shared CWE-22
CVE-2025-67684Shared CWE-22
CVE-2019-25471Shared CWE-22
CVE-2025-65346Shared CWE-22
CVE-2025-41758Shared CWE-22
CVE-2026-7519Shared CWE-22

References