CVE-2026-28414

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

05 Mar 2026, 13:09

Type Values Removed Values Added
CPE cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
First Time Gradio Project
Gradio Project gradio
References () https://github.com/gradio-app/gradio/security/advisories/GHSA-39mp-8hj3-5c49 - () https://github.com/gradio-app/gradio/security/advisories/GHSA-39mp-8hj3-5c49 - Exploit, Vendor Advisory
CWE CWE-22

27 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 22:16

Updated : 2026-03-05 13:09


NVD link : CVE-2026-28414

Mitre link : CVE-2026-28414

CVE.ORG link : CVE-2026-28414


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-36

Absolute Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')