A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/667d664d-8189-458c-8ed7-483fe8f33c76 | Exploit Third Party Advisory |
Configurations
History
14 Oct 2025, 18:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://huntr.com/bounties/667d664d-8189-458c-8ed7-483fe8f33c76 - Exploit, Third Party Advisory | |
| Summary |
|
|
| First Time |
Gradio Project
Gradio Project gradio |
|
| CPE | cpe:2.3:a:gradio_project:gradio:2024-09-18:*:*:*:*:python:*:* |
20 Mar 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-10-14 18:52
NVD link : CVE-2024-10648
Mitre link : CVE-2024-10648
CVE.ORG link : CVE-2024-10648
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-29
Path Traversal: '\..\filename'
