An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.
References
Link | Resource |
---|---|
https://huntr.com/bounties/35aaea93-6895-4f03-9c1b-cd992665aa60 | Exploit Third Party Advisory |
https://huntr.com/bounties/35aaea93-6895-4f03-9c1b-cd992665aa60 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 23:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () https://huntr.com/bounties/35aaea93-6895-4f03-9c1b-cd992665aa60 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:gradio_project:gradio:4.36.0:*:*:*:*:python:*:* | |
First Time |
Gradio Project
Gradio Project gradio |
Information
Published : 2024-06-22 06:15
Updated : 2025-07-29 23:55
NVD link : CVE-2024-4940
Mitre link : CVE-2024-4940
CVE.ORG link : CVE-2024-4940
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')