CVE-2026-33332 PUBLISHED

NiceGUI's unvalidated chunk size parameter in media routes can cause memory exhaustion

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 24.03.2026 Updated: 24.03.2026

NiceGUI is a Python-based UI framework. Prior to version 3.9.0, NiceGUI's app.add_media_file() and app.add_media_files() media routes accept a user-controlled query parameter that influences how files are read during streaming. The parameter is passed to the range-response implementation without validation, allowing an attacker to bypass chunked streaming and force the server to load entire files into memory at once. With large media files and concurrent requests, this can lead to excessive memory consumption, degraded performance, or denial of service. This issue has been patched in version 3.9.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor zauberzeug
Product nicegui
Versions
  • Version < 3.9.0 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling CWE