Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0247 | Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability. |
Github GHSA |
GHSA-9c6g-qpgj-rvxw | Streamlit publishes previously-patched Cross-site Scripting vulnerability |
Tue, 25 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Snowflake
Snowflake streamlit |
|
| CPEs | cpe:2.3:a:snowflake:streamlit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Streamlit
Streamlit streamlit |
Snowflake
Snowflake streamlit |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T14:54:44.086Z
Reserved: 2023-03-01T19:03:56.635Z
Link: CVE-2023-27494
Updated: 2024-08-02T12:16:35.362Z
Status : Modified
Published: 2023-03-16T21:15:13.270
Modified: 2024-11-21T07:53:01.200
Link: CVE-2023-27494
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA