Description
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g9cj-cfpp-4g2x | gradio vulnerable to Path Traversal |
References
History
Wed, 30 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gradio Project
Gradio Project gradio |
|
| CPEs | cpe:2.3:a:gradio_project:gradio:-:*:*:*:*:python:*:* | |
| Vendors & Products |
Gradio Project
Gradio Project gradio |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-02-13T17:32:16.918Z
Reserved: 2024-02-15T19:12:58.336Z
Link: CVE-2024-1561
Updated: 2024-08-01T18:40:21.441Z
Status : Analyzed
Published: 2024-04-16T00:15:08.887
Modified: 2025-07-30T14:48:04.053
Link: CVE-2024-1561
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA