Loading HuntDB...

GHSA-6qm2-wpxq-7qh2

GitHub Security Advisory

Gradio makes the `/file` secure against file traversal and server-side request forgery attacks

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Older versions of `gradio` contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for.

This was not possible through regular URLs passed into a browser, but it was possible through the use of programmatic tools such as `curl` with the `--pass-as-is` flag.

Furthermore, the `/file` route in Gradio apps also contained a vulnerability that made it possible to use it for SSRF attacks.

Both of these vulnerabilities have been fixed in `gradio==4.11.0`

Affected Packages

PyPI gradio
Affected versions: 0 (fixed in 4.11.0)

Related CVEs

Key Information

GHSA ID
GHSA-6qm2-wpxq-7qh2
Published
December 21, 2023 6:24 PM
Last Modified
February 16, 2024 9:52 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
gradio
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 12, 2025 6:34 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.