An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.

Project Subscriptions

Vendors Products
Gradio Project Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g9cj-cfpp-4g2x gradio vulnerable to Path Traversal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Gradio Project
Gradio Project gradio
CPEs cpe:2.3:a:gradio_project:gradio:-:*:*:*:*:python:*:*
Vendors & Products Gradio Project
Gradio Project gradio
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-02-13T17:32:16.918Z

Reserved: 2024-02-15T19:12:58.336Z

Link: CVE-2024-1561

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.441Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-16T00:15:08.887

Modified: 2025-07-30T14:48:04.053

Link: CVE-2024-1561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses