CVE-2024-1540

A command injection vulnerability exists in the deploy+test-visual.yml workflow of the gradio-app/gradio repository, due to improper neutralization of special elements used in a command. This vulnerability allows attackers to execute unauthorized commands, potentially leading to unauthorized modification of the base repository or secrets exfiltration. The issue arises from the unsafe handling of GitHub context information within a `run` operation, where expressions inside `${{ }}` are evaluated and substituted before script execution. Remediation involves setting untrusted input values to intermediate environment variables to prevent direct influence on script generation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

30 Jul 2025, 19:57

Type Values Removed Values Added
References () https://github.com/gradio-app/gradio/commit/d56bb28df80d8db1f33e4acf4f6b2c4f87cb8b28 - () https://github.com/gradio-app/gradio/commit/d56bb28df80d8db1f33e4acf4f6b2c4f87cb8b28 - Patch
References () https://huntr.com/bounties/0e39e974-9a66-476f-91f5-3f37abb03d77 - () https://huntr.com/bounties/0e39e974-9a66-476f-91f5-3f37abb03d77 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 8.6
v2 : unknown
v3 : 8.2
First Time Gradio Project
Gradio Project gradio
CPE cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

Information

Published : 2024-03-27 16:15

Updated : 2025-07-30 19:57


NVD link : CVE-2024-1540

Mitre link : CVE-2024-1540

CVE.ORG link : CVE-2024-1540


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')