New Streamlit Vulnerability Enables Cloud Account Takeover Attacks

Cybersecurity researchers at Cato Networks have uncovered a critical vulnerability in Streamlit, the popular open-source framework used for building data applications and financial dashboards, that could enable threat actors to manipulate stock market data and conduct cloud account takeover attacks.

The vulnerability, discovered in February 2025, affects the widely used st.file_uploader function and has already been patched in version 1.43.2.

Technical Exploitation Enables Backend Access

The vulnerability stems from improper file type enforcement in Streamlit’s file upload widget, where restrictions were only applied client-side through JavaScript without server-side validation.

Security researchers demonstrated how attackers could use proxy tools like Burp Suite to intercept upload requests and bypass frontend restrictions by modifying file extensions during transit.

The attack chain involves uploading malicious files disguised as legitimate ones, such as renaming malicious.exe to appear as a PDF file.

In their proof-of-concept demonstration, researchers showed how this could escalate to directory traversal attacks, where threat actors modify uploaded filenames to ../../.ssh/authorized_keys and overwrite critical system files with their SSH public keys.

This technique grants passwordless remote access to compromised cloud instances running Streamlit applications.

The technical exploitation follows a systematic approach: reconnaissance of publicly accessible

Streamlit instances, interception of requests to alter file extensions and paths, overwriting of the authorized_keys file, establishment of SSH access, enumeration of the cloud environment, and finally, manipulation of the data pipeline.

Financial Markets Face Unprecedented Cyber Risk

The implications for financial institutions are particularly alarming, as Streamlit has become a go-to framework for building stock market dashboards, machine learning prototypes, and real-time financial data visualizations.

Cato Networks’ researchers demonstrated how compromised instances could manipulate ingestion of pipeline scripts, database values, and dashboard code, potentially leading to undetected market manipulation.

Such attacks could trigger cascading effects where automated trading systems respond to false signals, media sentiment shifts based on manipulated data, and investors follow fraudulent trends.

The researchers noted that “stock market dashboards may drive automated alerts, risk models, and internal strategy decisions, meaning the manipulation could trigger a chain reaction of portfolio adjustments”.

Streamlit, acquired by Snowflake in March 2022, acknowledged the vulnerability and released a patch introducing backend validation to enforce file-type restrictions.

Cato Networks has updated its SASE Cloud Platform with enhanced threat prevention capabilities targeting unauthorized file upload bypass attempts and abnormal filename path detection.

Organizations are urged to ensure that cloud instances hosting web applications implement proper network restrictions and access controls.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here