To prevent malicious 3rd party websites from making requests to Gradio applications running locally, this PR tightens the CORS rules around Gradio applications. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.
References
| Link | Resource |
|---|---|
| https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a | Patch |
| https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff | Exploit Third Party Advisory |
| https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a | Patch |
| https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff | Exploit Third Party Advisory |
Configurations
History
30 Jul 2025, 20:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a - Patch | |
| References | () https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff - Exploit, Third Party Advisory | |
| First Time |
Gradio Project gradio
Gradio Project |
|
| CPE | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* |
21 Nov 2024, 08:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a - | |
| References | () https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff - |
21 Mar 2024, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-21 20:15
Updated : 2025-07-30 20:11
NVD link : CVE-2024-1727
Mitre link : CVE-2024-1727
CVE.ORG link : CVE-2024-1727
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
