Gradio is an open-source Python package designed to enable quick builds of a demo or web application. If File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server. This issue has been addressed in release version 5.5.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 | Exploit Third Party Advisory | 
Configurations
                    History
                    26 Aug 2025, 16:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
| First Time | Gradio Project gradio Gradio Project | 
08 Nov 2024, 19:01
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
06 Nov 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-06 20:15
Updated : 2025-08-26 16:34
NVD link : CVE-2024-51751
Mitre link : CVE-2024-51751
CVE.ORG link : CVE-2024-51751
JSON object : View
Products Affected
                gradio_project
- gradio
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
