Loading HuntDB...

GHSA-973g-55hp-3frw

GitHub Security Advisory

Server-Side Request Forgery in gradio

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio and was discovered in version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.

Affected Packages

PyPI gradio
Affected versions: 0 (last affected: 4.36.0)

Related CVEs

Key Information

GHSA ID
GHSA-973g-55hp-3frw
Published
June 6, 2024 6:30 PM
Last Modified
June 6, 2024 10:06 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
gradio
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.