Description
An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response.
Published: 2024-04-16
Score: 6.5 Medium
EPSS: 55.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qh6x-j82h-vpf9 gradio Server-Side Request Forgery vulnerability
History

Tue, 29 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Gradio Project
Gradio Project gradio
CPEs cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
Vendors & Products Gradio Project
Gradio Project gradio

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.30404}

epss

{'score': 0.28296}


Subscriptions

Gradio Project Gradio
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T18:33:24.939Z

Reserved: 2024-02-02T00:58:50.748Z

Link: CVE-2024-1183

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:24.939Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-16T00:15:07.990

Modified: 2025-07-29T19:03:21.927

Link: CVE-2024-1183

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses