PT-2026-29084 · Unknown+1 · Awesome-Llm-Apps+2
Pham Minh
·
Published
2026-03-30
·
Updated
2026-03-30
·
CVE-2026-29872
CVSS v3.1
8.2
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
awesome-llm-apps versions prior to commit e46690f99c3f08be80a9877fab52acacf7ab8251
Description
A cross-session information disclosure issue exists in the awesome-llm-apps project. The Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using
os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse.Recommendations
Update to commit e46690f99c3f08be80a9877fab52acacf7ab8251 or a later version.
Exploit
Fix
Improper Access Control
Insufficiently Protected Credentials
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Github Mcp Agent
Streamlit
Awesome-Llm-Apps