Gradio is an open-source Python package designed to enable quick builds of a demo or web application. If File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server. This issue has been addressed in release version 5.5.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 | Exploit Third Party Advisory |
Configurations
History
26 Aug 2025, 16:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
References | () https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 - Exploit, Third Party Advisory | |
First Time |
Gradio Project
Gradio Project gradio |
08 Nov 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-06 20:15
Updated : 2025-08-26 16:34
NVD link : CVE-2024-51751
Mitre link : CVE-2024-51751
CVE.ORG link : CVE-2024-51751
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')