Home » Database

AVID-2026-R1514

Description

streamlit-geospatial remote code execution in pages/8_🏜️_Raster_Data_Visualization.py (CVE-2024-41119)

Details

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the vis_params variable on line 80 in 8_🏜️_Raster_Data_Visualization.py takes user input, which is later used in the eval() function on line 86, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Reason for inclusion in AVID: CVE-2024-41119 describes a remote code execution via unsafe eval with user-controlled input in streamlit-geospatial. This is a security vulnerability in a Python package that could be part of AI data apps, dashboards, or pipelines (streamlit-based tooling often used in ML/AI workflows). As a vulnerability in a dependency used to build/deploy AI systems, it constitutes a software supply chain issue in the general-purpose AI stack. The CVE details, commit fix, and CVSS/ CWE signal (CWE-20) provide clear evidence of the vulnerability.

References

Affected or Relevant Artifacts

  • Developer: opengeos
  • Deployer: opengeos
  • Artifact Details:
TypeName
Systemstreamlit-geospatial

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-20CWE-20: Improper Input Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-07-26
  • Version: 0.3.3
  • AVID Entry