Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/gradio-app/gradio/security/advisories/GHSA-39mp-8hj3-5c49 | Exploit Vendor Advisory |
Configurations
History
05 Mar 2026, 13:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
| First Time |
Gradio Project
Gradio Project gradio |
|
| References | () https://github.com/gradio-app/gradio/security/advisories/GHSA-39mp-8hj3-5c49 - Exploit, Vendor Advisory | |
| CWE | CWE-22 |
27 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 22:16
Updated : 2026-03-05 13:09
NVD link : CVE-2026-28414
Mitre link : CVE-2026-28414
CVE.ORG link : CVE-2026-28414
JSON object : View
Products Affected
gradio_project
- gradio
