Loading HuntDB...

GHSA-r364-m2j9-mf4h

GitHub Security Advisory

gradio Server-Side Request Forgery vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.

Affected Packages

PyPI gradio
Affected versions: 0 (fixed in 4.18.0)

Related CVEs

Key Information

GHSA ID
GHSA-r364-m2j9-mf4h
Published
March 27, 2024 3:31 AM
Last Modified
April 16, 2024 3:51 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
gradio
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 9, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.