Description
Streamlit is a data oriented application development framework for python. Streamlit Open Source versions prior to 1.54.0 running on Windows hosts have an unauthenticated Server-Side Request Forgery (SSRF) vulnerability. The vulnerability arises from improper validation of attacker-supplied filesystem paths. In certain code paths, including within the `ComponentRequestHandler`, filesystem paths are resolved using `os.path.realpath()` or `Path.resolve()` before sufficient validation occurs. On Windows systems, supplying a malicious UNC path (e.g., `\\attacker-controlled-host\share`) can cause the Streamlit server to initiate outbound SMB connections over port 445. When Windows attempts to authenticate to the remote SMB server, NTLMv2 challenge-response credentials of the Windows user running the Streamlit process may be transmitted. This behavior may allow an attacker to perform NTLM relay attacks against other internal services and/or identify internally reachable SMB hosts via timing analysis. The vulnerability has been fixed in Streamlit Open Source version 1.54.0.
Published: 2026-03-26
Score: 4.7 Medium
EPSS: n/a
KEV: No
Impact: NTLM Credential Exposure via Unauthenticated SSRF
Action: Immediate Patch
AI Analysis

Impact

Streamlit Open Source versions running on Windows that precede 1.54.0 possess an unauthenticated server‑side request forgery flaw. The flaw stems from inadequate validation of filesystem paths supplied by an attacker. When a malicious UNC path such as \\attacker-host\share is provided, the Streamlit process resolves the path using functions like os.path.realpath() before performing full validation. This allows the server to initiate outbound SMB traffic on port 445. As Windows attempts to authenticate to the remote SMB share, the NTLMv2 challenge‑response credentials of the user account under which the Streamlit process runs may be transmitted. An attacker could leverage this to execute NTLM relay attacks against other internal services or to discover reachable SMB hosts through timing analysis, thereby compromising confidentiality and integrity of the underlying environment.

Affected Systems

The affected systems are installations of the Streamlit framework, specifically the streamlit:streamlit product. Any Windows host running Streamlit Open Source prior to version 1.54.0 is vulnerable. The flaw is tied to code paths within the ComponentRequestHandler component and manifests when UNC paths are supplied by an unauthenticated client, so the impact is limited to environments where Streamlit is exposed on the network.

Risk and Exploitability

The CVSS score of 4.7 indicates moderate severity, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. EPSS data is unavailable, but the attack requires the attacker to direct a malformed request to a vulnerable Streamlit instance; the path may be discovered by scanning the network. Exploitation would succeed without special privileges beyond network reachability to the Streamlit server. Given the potential for NTLM credential leakage and relay attacks, the risk is non‑trivial in environments with sensitive internal services.

Generated by OpenCVE AI on March 26, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Streamlit Open Source to version 1.54.0 or later.

Generated by OpenCVE AI on March 26, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7p48-42j8-8846 Unauthenticated SSRF Vulnerability in Streamlit on Windows (NTLM Credential Exposure)
History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Streamlit
Streamlit streamlit
Vendors & Products Streamlit
Streamlit streamlit

Thu, 26 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Streamlit is a data oriented application development framework for python. Streamlit Open Source versions prior to 1.54.0 running on Windows hosts have an unauthenticated Server-Side Request Forgery (SSRF) vulnerability. The vulnerability arises from improper validation of attacker-supplied filesystem paths. In certain code paths, including within the `ComponentRequestHandler`, filesystem paths are resolved using `os.path.realpath()` or `Path.resolve()` before sufficient validation occurs. On Windows systems, supplying a malicious UNC path (e.g., `\\attacker-controlled-host\share`) can cause the Streamlit server to initiate outbound SMB connections over port 445. When Windows attempts to authenticate to the remote SMB server, NTLMv2 challenge-response credentials of the Windows user running the Streamlit process may be transmitted. This behavior may allow an attacker to perform NTLM relay attacks against other internal services and/or identify internally reachable SMB hosts via timing analysis. The vulnerability has been fixed in Streamlit Open Source version 1.54.0.
Title Streamlit on Windows has Unauthenticated SSRF Vulnerability (NTLM Credential Exposure)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Streamlit Streamlit
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T21:45:05.616Z

Reserved: 2026-03-23T16:34:59.931Z

Link: CVE-2026-33682

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T22:16:30.880

Modified: 2026-03-26T22:16:30.880

Link: CVE-2026-33682

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:23:03Z

Weaknesses