Loading HuntDB...

GHSA-3f95-mxq2-2f63

GitHub Security Advisory

Gradio Local File Inclusion vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.

Affected Packages

PyPI gradio
Affected versions: 0 (fixed in 4.19.2)

Related CVEs

Key Information

GHSA ID
GHSA-3f95-mxq2-2f63
Published
April 10, 2024 6:30 PM
Last Modified
April 10, 2024 10:12 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
gradio
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 9, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.