{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-66469","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-02T15:43:16.586Z","datePublished":"2025-12-08T23:54:37.955Z","dateUpdated":"2025-12-09T16:03:54.125Z"},"containers":{"cna":{"title":"NiceGUI Reflected XSS in ui.add_css, ui.add_scss, and ui.add_sass via Style Injection","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/zauberzeug/nicegui/security/advisories/GHSA-72qc-wxch-74mg","tags":["x_refsource_CONFIRM"],"url":"https://github.com/zauberzeug/nicegui/security/advisories/GHSA-72qc-wxch-74mg"},{"name":"https://github.com/zauberzeug/nicegui/commit/a8fd25b7d5e23afb1952d0f60a1940e18b5f1ca8","tags":["x_refsource_MISC"],"url":"https://github.com/zauberzeug/nicegui/commit/a8fd25b7d5e23afb1952d0f60a1940e18b5f1ca8"}],"affected":[{"vendor":"zauberzeug","product":"nicegui","versions":[{"version":"< 3.4.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-12-08T23:54:37.955Z"},"descriptions":[{"lang":"en","value":"NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to Reflected XSS through its ui.add_css, ui.add_scss, and ui.add_sass functions. The functions lack proper sanitization or encoding for the JavaScript context they generate. An attacker can break out of the intended <style> or <script> tags by injecting closing tags (e.g., </style> or </script>), allowing for the execution of arbitrary JavaScript. This issue is fixed in version 3.4.0."}],"source":{"advisory":"GHSA-72qc-wxch-74mg","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/zauberzeug/nicegui/security/advisories/GHSA-72qc-wxch-74mg","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:18:04.262651Z","id":"CVE-2025-66469","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T16:03:54.125Z"}}]}}