PYSEC-2024-275

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/gradio/PYSEC-2024-275.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2024-275
Aliases
Published
2024-11-06T20:15:05.557Z
Modified
2026-05-20T09:19:01.741927Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Gradio is an open-source Python package designed to enable quick builds of a demo or web application. If File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server. This issue has been addressed in release version 5.5.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

PyPI / gradio

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.5.0

Affected versions

5.*
5.0.0
5.0.1
5.0.2
5.1.0
5.3.0
5.4.0

Database specific

source
"https://github.com/pypa/advisory-database/blob/main/vulns/gradio/PYSEC-2024-275.yaml"