Vulnerabilities (CVE)

Filtered by vendor Gradio Project Subscribe
Filtered by product Gradio
Total 36 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-1727 1 Gradio Project 1 Gradio 2025-07-30 N/A 4.3 MEDIUM
To prevent malicious 3rd party websites from making requests to Gradio applications running locally, this PR tightens the CORS rules around Gradio applications. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.
CVE-2024-1540 1 Gradio Project 1 Gradio 2025-07-30 N/A 8.2 HIGH
Previously, it was possible to exfiltrate secrets in Gradio's CI, but this is now fixed.
CVE-2024-4253 1 Gradio Project 1 Gradio 2025-07-30 N/A 9.1 CRITICAL
A command injection vulnerability exists in the gradio-app/gradio repository, specifically within the 'test-functional.yml' workflow. The vulnerability arises due to improper neutralization of special elements used in a command, allowing for unauthorized modification of the base repository or secrets exfiltration. The issue affects versions up to and including '@gradio/video@0.6.12'. The flaw is present in the workflow's handling of GitHub context information, where it echoes the full name of the head repository, the head branch, and the workflow reference without adequate sanitization. This could potentially lead to the exfiltration of sensitive secrets such as 'GITHUB_TOKEN', 'COMMENT_TOKEN', and 'CHROMATIC_PROJECT_TOKEN'.
CVE-2024-4254 1 Gradio Project 1 Gradio 2025-07-30 N/A 7.1 HIGH
The 'deploy-website.yml' workflow in the gradio-app/gradio repository, specifically in the 'main' branch, is vulnerable to secrets exfiltration due to improper authorization. The vulnerability arises from the workflow's explicit checkout and execution of code from a fork, which is unsafe as it allows the running of untrusted code in an environment with access to push to the base repository and access secrets. This flaw could lead to the exfiltration of sensitive secrets such as GITHUB_TOKEN, HF_TOKEN, VERCEL_ORG_ID, VERCEL_PROJECT_ID, COMMENT_TOKEN, AWSACCESSKEYID, AWSSECRETKEY, and VERCEL_TOKEN. The vulnerability is present in the workflow file located at https://github.com/gradio-app/gradio/blob/72f4ca88ab569aae47941b3fb0609e57f2e13a27/.github/workflows/deploy-website.yml.
CVE-2024-1728 1 Gradio Project 1 Gradio 2025-07-30 N/A 7.5 HIGH
gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.
CVE-2024-1561 1 Gradio Project 1 Gradio 2025-07-30 N/A 7.5 HIGH
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
CVE-2024-1729 1 Gradio Project 1 Gradio 2025-07-30 N/A 5.9 MEDIUM
Th password check condition is vulnerable to timing attack to guess the password
CVE-2024-4940 1 Gradio Project 1 Gradio 2025-07-29 N/A 6.1 MEDIUM
An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.
CVE-2024-2206 1 Gradio Project 1 Gradio 2025-07-29 N/A 6.5 MEDIUM
The /proxy route allows a user to proxy arbitrary urls including potential internal endpoints.
CVE-2024-1183 1 Gradio Project 1 Gradio 2025-07-29 N/A 6.5 MEDIUM
An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response.
CVE-2024-39236 1 Gradio Project 1 Gradio 2025-06-27 N/A 9.8 CRITICAL
Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input. NOTE: the supplier disputes this because the report is about a user attacking himself.
CVE-2024-34510 1 Gradio Project 1 Gradio 2025-06-17 N/A 7.5 HIGH
Gradio before 4.20 allows credential leakage on Windows.
CVE-2024-48052 1 Gradio Project 1 Gradio 2025-06-13 N/A 6.5 MEDIUM
In gradio <=4.42.0, the gr.DownloadButton function has a hidden server-side request forgery (SSRF) vulnerability. The reason is that within the save_url_to_cache function, there are no restrictions on the URL, which allows access to local target resources. This can lead to the download of local resources and sensitive information.
CVE-2024-8021 1 Gradio Project 1 Gradio 2025-03-26 N/A 6.1 MEDIUM
An open redirect vulnerability exists in the latest version of gradio-app/gradio. The vulnerability allows an attacker to redirect users to a malicious website by URL encoding. This can be exploited by sending a crafted request to the application, which results in a 302 redirect to an attacker-controlled site.
CVE-2024-4941 1 Gradio Project 1 Gradio 2024-11-21 N/A 7.5 HIGH
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio version 4.25. The vulnerability arises from improper input validation in the `postprocess()` function within `gradio/components/json_component.py`, where a user-controlled string is parsed as JSON. If the parsed JSON object contains a `path` key, the specified file is moved to a temporary directory, making it possible to retrieve it later via the `/file=..` endpoint. This issue is due to the `processing_utils.move_files_to_cache()` function traversing any object passed to it, looking for a dictionary with a `path` key, and then copying the specified file to a temporary directory. The vulnerability can be exploited by an attacker to read files on the remote system, posing a significant security risk.
CVE-2024-4325 1 Gradio Project 1 Gradio 2024-11-21 N/A 8.6 HIGH
A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.
CVE-2024-0964 1 Gradio Project 1 Gradio 2024-11-21 N/A 9.4 CRITICAL
A local file include could be remotely triggered in Gradio due to a vulnerable user-supplied JSON value in an API request.
CVE-2023-6572 1 Gradio Project 1 Gradio 2024-11-21 N/A 8.1 HIGH
Command Injection in GitHub repository gradio-app/gradio prior to main.
CVE-2023-51449 1 Gradio Project 1 Gradio 2024-11-21 N/A 5.6 MEDIUM
Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0.
CVE-2023-41626 1 Gradio Project 1 Gradio 2024-11-21 N/A 4.8 MEDIUM
Gradio v3.27.0 was discovered to contain an arbitrary file upload vulnerability via the /upload interface.