Gradio Project

Gradio

47 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.24%
  • Veröffentlicht 10.10.2024 22:15:11
  • Zuletzt bearbeitet 17.10.2024 16:53:29

Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **Server-Side Request Forgery (SSRF)** in the `/queue/join` endpoint. Gradio’s `async_save_url_to_cache` function allows attackers to force the Grad...

  • EPSS 0.2%
  • Veröffentlicht 10.10.2024 22:15:10
  • Zuletzt bearbeitet 17.10.2024 16:40:03

Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to the **bypass of directory traversal checks** within the `is_in_or_equal` function. This function, intended to check if a file resides within a given...

  • EPSS 0.25%
  • Veröffentlicht 10.10.2024 22:15:10
  • Zuletzt bearbeitet 17.10.2024 16:48:17

Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **one-level read path traversal** in the `/custom_component` endpoint. Attackers can exploit this flaw to access and leak source code from custom Gr...

  • EPSS 0.17%
  • Veröffentlicht 10.10.2024 22:15:10
  • Zuletzt bearbeitet 17.10.2024 16:46:39

Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **CORS origin validation accepting a null origin**. When a Gradio server is deployed locally, the `localhost_aliases` variable includes "null" as a ...

  • EPSS 0.14%
  • Veröffentlicht 10.10.2024 22:15:10
  • Zuletzt bearbeitet 17.10.2024 16:30:59

Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker’s webs...

Exploit
  • EPSS 1.88%
  • Veröffentlicht 01.07.2024 19:15:05
  • Zuletzt bearbeitet 27.06.2025 17:32:17

Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input. NOTE: the supplier disputes this because the report is about a user attacking hi...

Exploit
  • EPSS 7.24%
  • Veröffentlicht 22.06.2024 06:15:11
  • Zuletzt bearbeitet 29.07.2025 23:55:06

An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Serve...

Exploit
  • EPSS 0.56%
  • Veröffentlicht 06.06.2024 18:15:18
  • Zuletzt bearbeitet 15.10.2025 13:15:45

A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio version 4.25. The vulnerability arises from improper input validation in the `postprocess()` function within `gradio/components/json_component.py`, where a user-co...

Exploit
  • EPSS 65.09%
  • Veröffentlicht 06.06.2024 18:15:18
  • Zuletzt bearbeitet 21.11.2024 09:42:37

A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the ...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 04.06.2024 12:15:13
  • Zuletzt bearbeitet 15.10.2025 13:15:44

The 'deploy-website.yml' workflow in the gradio-app/gradio repository, specifically in the 'main' branch, is vulnerable to secrets exfiltration due to improper authorization. The vulnerability arises from the workflow's explicit checkout and executio...