[webapps] NiceGUI 3.6.1 - Path Traversal
ATT&CK techniques detected
T1059.006Python
77%
“##e - 2026 - 25732 — nicegui arbitrary file write ( path traversal ) exploits unsanitized fileupload. name when app uses it in save path. usage : python exploit _ cve _ 2026 _ 25732. py http : / / target : 8080 ".. / etc / passwd " payload. txt python exploit _ cve _ 2026 _ 25732…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
48%
“/ file ' etc. " ) if _ _ name _ _ = = ' _ _ main _ _ ' : if len ( sys. argv )! = 4 : print ( _ _ doc _ _ ) sys. exit ( 1 ) target = sys. argv [ 1 ] dest _ filename = sys. argv [ 2 ] payload _ file = sys. argv [ 3 ] exploit ( target, dest _ filename, payload _ file )”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
NiceGUI 3.6.1 - Path Traversal