Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/gradio-app/gradio/security/advisories/GHSA-jmh7-g254-2cq9 | Vendor Advisory |
Configurations
History
05 Mar 2026, 13:03
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gradio Project
Gradio Project gradio |
|
| References | () https://github.com/gradio-app/gradio/security/advisories/GHSA-jmh7-g254-2cq9 - Vendor Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* |
27 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 22:16
Updated : 2026-03-05 13:03
NVD link : CVE-2026-28416
Mitre link : CVE-2026-28416
CVE.ORG link : CVE-2026-28416
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-918
Server-Side Request Forgery (SSRF)
