<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-45553 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45553/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 20:22:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45553/feed.xml" rel="self" type="application/rss+xml"/><item><title>NiceGUI Local File Disclosure via Docutils File Insertion (CVE-2026-45553)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nicegui-lfd/</link><pubDate>Mon, 18 May 2026 20:22:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nicegui-lfd/</guid><description>CVE-2026-45553 allows a remote attacker to read arbitrary local files by injecting reStructuredText directives into the `ui.restructured_text()` function of a NiceGUI application, if the application passes user-controlled content to that function.</description><content:encoded><![CDATA[<p>A local file disclosure vulnerability exists in the NiceGUI library, specifically affecting applications that utilize the <code>ui.restructured_text()</code> function with untrusted input. When a NiceGUI application passes attacker-controlled reStructuredText content to the <code>ui.restructured_text()</code> function, it&rsquo;s possible for an attacker to inject malicious Docutils directives to read arbitrary local files accessible to the NiceGUI server process. The vulnerability lies in the server-side rendering of reStructuredText using Docutils without proper sanitization or disabling of file insertion directives. This issue affects NiceGUI versions 3.11.1 and earlier and is identified as CVE-2026-45553. Successful exploitation allows attackers to potentially access sensitive information such as application <code>.env</code> files, database URLs, API tokens, and source code.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a NiceGUI application that uses the <code>ui.restructured_text()</code> function.</li>
<li>The attacker finds an input field (e.g., form field, query parameter) that passes data to <code>ui.restructured_text()</code>.</li>
<li>The attacker crafts malicious reStructuredText content containing a file inclusion directive, such as <code>.. include:: /etc/passwd</code>.</li>
<li>The attacker injects the malicious payload into the identified input field.</li>
<li>The NiceGUI server processes the reStructuredText content via Docutils, rendering the injected directive.</li>
<li>Docutils reads the specified local file (<code>/etc/passwd</code> in this example) from the server&rsquo;s filesystem.</li>
<li>The content of the file is embedded into the generated HTML output.</li>
<li>The attacker views the application, revealing the contents of the targeted local file in the HTML.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-45553) allows an attacker to read arbitrary files on the server&rsquo;s filesystem, provided the NiceGUI server process has the necessary permissions. This can lead to the disclosure of sensitive information, including application configuration files (<code>.env</code>), database credentials, API keys, session secrets, OAuth credentials, Docker/Kubernetes secrets, and application source code. The vulnerability can result in significant confidentiality loss and potentially compromise the entire application or infrastructure. Applications are only vulnerable when they pass untrusted or user-controlled reStructuredText input to the <code>ui.restructured_text()</code> function.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to NiceGUI version 3.11.2 or later, which includes the recommended fix to disable unsafe Docutils features.</li>
<li>Deploy the Sigma rule <code>Detect NiceGUI RCE Attempts via Restructured Text</code> to monitor for exploitation attempts by detecting the presence of file inclusion directives in HTTP requests to NiceGUI applications.</li>
<li>Apply the remediation steps outlined in the advisory (<a href="https://github.com/advisories/GHSA-jfrm-rx66-g536">https://github.com/advisories/GHSA-jfrm-rx66-g536</a>) which disables file insertion and raw directives in the Docutils configuration.</li>
<li>If upgrading is not immediately feasible, sanitize user-supplied input before passing it to <code>ui.restructured_text()</code> to remove or escape potentially malicious reStructuredText directives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>local-file-disclosure</category><category>nicegui</category><category>docutils</category><category>CVE-2026-45553</category></item></channel></rss>