Description
A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse.
Published: 2026-03-30
Score: 8.2 High
EPSS: n/a
KEV: No
Impact: Disclosure of API tokens leading to unauthorized access
Action: Patch ASAP
AI Analysis

Impact

A cross‑session information disclosure vulnerability exists in the awesome‑llm‑apps project. The Streamlit‑based GitHub MCP Agent stores user‑supplied API tokens in process‑wide environment variables without session isolation. Consequently, a credential supplied by one user can be accessed by any subsequent unauthenticated user. This can expose GitHub Personal Access Tokens or LLM API keys, enabling unauthorized access to private resources and potential financial abuse.

Affected Systems

The affected product is the awesome‑llm‑apps project, specifically the Streamlit‑based GitHub MCP Agent that uses Python’s os.environ to store user tokens. The vulnerability is present in the commit e46690f99c3f08be80a9877fab52acacf7ab8251, dated 2026‑01‑19. No other version range is listed in the advisory.

Risk and Exploitability

The CVSS score is 8.2, indicating a high‑severity issue. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but the nature of the flaw makes it relatively easy to exploit: an attacker only needs access to any session of the web application to read the process’s environment variables. Tools that can inspect environment variables from the Python runtime can retrieve the tokens. Because the flaw permits data leakage without any authentication to the victim’s session, the likelihood of exploitation is significant in multi‑user deployments.

Generated by OpenCVE AI on March 30, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update awesome‑llm‑apps to a version newer than commit e46690f99c3f08be80a9877fab52acacf7ab8251 that fixes the environment variable storage.
  • If a newer version is not available, configure the Streamlit app to run with isolated processes per user or enforce session isolation.
  • Replace os.environ token storage with secure, per‑session storage, such as encrypted vaults or temporary files with restricted permissions.
  • Review and monitor logs for any accidental token exposure or unauthorized token usage.
  • Inform users to avoid sharing tokens and rotate them regularly.

Generated by OpenCVE AI on March 30, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title Cross‑Session Information Disclosure of API Tokens in Awesome‑LLM‑Apps

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284
CWE-522
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T18:15:13.246Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29872

cve-icon Vulnrichment

Updated: 2026-03-30T18:12:21.520Z

cve-icon NVD

Status : Received

Published: 2026-03-30T18:16:18.523

Modified: 2026-03-30T19:16:24.170

Link: CVE-2026-29872

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:17Z

Weaknesses