A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-7103 | A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server. |
![]() |
GHSA-pgfv-gvc5-prfg | Gradio Vulnerable to Arbitrary File Deletion |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 14 Oct 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gradio Project
Gradio Project gradio |
|
CPEs | cpe:2.3:a:gradio_project:gradio:2024-09-18:*:*:*:*:python:*:* | |
Vendors & Products |
Gradio Project
Gradio Project gradio |
Thu, 20 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server. | |
Title | Path Traversal in gradio-app/gradio | |
Weaknesses | CWE-29 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T14:21:33.649Z
Reserved: 2024-10-31T20:21:14.651Z
Link: CVE-2024-10648

Updated: 2025-03-20T14:20:51.610Z

Status : Analyzed
Published: 2025-03-20T10:15:18.010
Modified: 2025-10-14T18:52:29.127
Link: CVE-2024-10648

No data.

No data.