CVE-2024-51751

Gradio is an open-source Python package designed to enable quick builds of a demo or web application. If File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server. This issue has been addressed in release version 5.5.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

26 Aug 2025, 16:34

Type Values Removed Values Added
CPE cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
First Time Gradio Project
Gradio Project gradio
References () https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 - () https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 - Exploit, Third Party Advisory

Information

Published : 2024-11-06 20:15

Updated : 2025-08-26 16:34


NVD link : CVE-2024-51751

Mitre link : CVE-2024-51751

CVE.ORG link : CVE-2024-51751


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')