Impact
An unsafe implementation in NiceGUI’s click event listener tied to the ui.sub_pages component allows an attacker to embed a link that, when clicked by a user, triggers the browser to execute attacker‑controlled JavaScript code. This results in client‑side cross‑site scripting, enabling arbitrary JavaScript execution within the victim’s browser context when the link is activated.
Affected Systems
The vulnerability affects the Python‑based NiceGUI UI framework from versions 2.22.0 through 3.4.1 released by zauberzeug. All deployments that use these affected releases and permit user‑controlled links to be rendered via ui.sub_pages are at risk until patched to version 3.5.0 or newer.
Risk and Exploitability
The CVSS score is 6.1, indicating a medium severity. The EPSS score is below 1 %, suggesting a low but non‑zero likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. The likely attack vector is local client‑side XSS, requiring the victim to click a crafted link; thus, it is an in‑browser exploitation that relies on user interaction.
OpenCVE Enrichment
Github GHSA