Impact
Gradio, an open-source Python library, contains a logic flaw in its path handling for Windows systems running Python 3.13 or newer. The change in the definition of os.path.isabs allows root‑relative paths such as "/windows/win.ini" to be treated as relative, bypassing the framework’s safe join logic. This flaw is a typical absolute path traversal (CWE‑22/36) that can let an unauthenticated attacker read any file accessible to the Gradio process, including sensitive system files, thereby compromising confidentiality.
Affected Systems
The vulnerability affects the Gradio package from gradio-app:gradio, specifically any installation prior to version 6.7 running on Windows with Python 3.13 or higher.
Risk and Exploitability
With a CVSS base score of 7.5 and an EPSS of 2%, the vulnerability presents a high severity risk, though exploitation probability remains relatively low. It is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves interacting with the Gradio interface, such as its exposed API endpoints, although this inference is made from the noted flaw in path sanitization. The flaw allows reading any file accessible to the Gradio process, even when authentication is present, and does not require elevated privileges on the target machine.
OpenCVE Enrichment
Github GHSA