CVE-2024-47084
- EPSS 0.14%
- Veröffentlicht 10.10.2024 22:15:10
- Zuletzt bearbeitet 17.10.2024 16:30:59
Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker’s webs...
CVE-2024-39236
- EPSS 1.81%
- Veröffentlicht 01.07.2024 19:15:05
- Zuletzt bearbeitet 27.06.2025 17:32:17
Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input. NOTE: the supplier disputes this because the report is about a user attacking hi...
CVE-2024-4940
- EPSS 7.24%
- Veröffentlicht 22.06.2024 06:15:11
- Zuletzt bearbeitet 29.07.2025 23:55:06
An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Serve...
CVE-2024-4941
- EPSS 0.77%
- Veröffentlicht 06.06.2024 18:15:18
- Zuletzt bearbeitet 15.10.2025 13:15:45
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio version 4.25. The vulnerability arises from improper input validation in the `postprocess()` function within `gradio/components/json_component.py`, where a user-co...
CVE-2024-4325
- EPSS 65.09%
- Veröffentlicht 06.06.2024 18:15:18
- Zuletzt bearbeitet 21.11.2024 09:42:37
A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the ...
CVE-2024-4254
- EPSS 0.57%
- Veröffentlicht 04.06.2024 12:15:13
- Zuletzt bearbeitet 15.10.2025 13:15:44
The 'deploy-website.yml' workflow in the gradio-app/gradio repository, specifically in the 'main' branch, is vulnerable to secrets exfiltration due to improper authorization. The vulnerability arises from the workflow's explicit checkout and executio...
CVE-2024-4253
- EPSS 1.9%
- Veröffentlicht 04.06.2024 08:15:10
- Zuletzt bearbeitet 15.10.2025 13:15:44
A command injection vulnerability exists in the gradio-app/gradio repository, specifically within the 'test-functional.yml' workflow. The vulnerability arises due to improper neutralization of special elements used in a command, allowing for unauthor...
CVE-2024-34510
- EPSS 0.09%
- Veröffentlicht 05.05.2024 20:15:07
- Zuletzt bearbeitet 17.06.2025 16:31:24
Gradio before 4.20 allows credential leakage on Windows.
CVE-2024-1561
- EPSS 93.58%
- Veröffentlicht 16.04.2024 00:15:08
- Zuletzt bearbeitet 30.07.2025 14:48:04
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cac...
CVE-2024-1183
- EPSS 65.67%
- Veröffentlicht 16.04.2024 00:15:07
- Zuletzt bearbeitet 29.07.2025 19:03:21
An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can disc...