CVE-2024-48052: n/a
In gradio <=4.42.0, the gr.DownloadButton function has a hidden server-side request forgery (SSRF) vulnerability. The reason is that within the save_url_to_cache function, there are no restrictions on the URL, which allows access to local target resources. This can lead to the download of local resources and sensitive information.
AI Analysis
Technical Summary
CVE-2024-48052 is a server-side request forgery (SSRF) vulnerability affecting Gradio, an open-source Python library used to build machine learning and data science web applications. Specifically, the vulnerability exists in the gr.DownloadButton function in versions up to 4.42.0. The root cause lies in the save_url_to_cache function, which processes URLs without applying any restrictions or validation. This lack of validation allows an attacker to supply arbitrary URLs, including those pointing to internal or local network resources. When the server processes these URLs, it fetches the content and caches it, effectively enabling an attacker to retrieve sensitive internal files or services that are otherwise inaccessible externally. The vulnerability requires the attacker to have some level of privileges (PR:L), meaning they must have limited access to the system or application, but does not require user interaction. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the high confidentiality impact but no impact on integrity or availability. The attack vector is network-based (AV:N), and the scope is unchanged (S:U). No known exploits have been reported in the wild, and no official patches have been linked yet. This vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
The primary impact of CVE-2024-48052 is the unauthorized disclosure of sensitive information residing on internal or local network resources accessible to the vulnerable Gradio server. Attackers exploiting this vulnerability can bypass network segmentation and firewall protections by leveraging the server as a proxy to access internal endpoints, configuration files, or other sensitive data. This can lead to data leakage of confidential information, intellectual property, or credentials stored on internal systems. While the vulnerability does not allow modification of data or denial of service, the confidentiality breach alone can have severe consequences, including regulatory non-compliance, reputational damage, and facilitation of further attacks such as lateral movement within an organization’s network. Organizations deploying Gradio in production environments, especially those exposing the application to untrusted users or the internet, face increased risk. The vulnerability’s exploitation requires some level of access, so insider threats or compromised accounts could be leveraged to exploit it. The absence of known exploits currently reduces immediate risk but does not eliminate the threat as attackers may develop exploits once the vulnerability is publicly disclosed.
Mitigation Recommendations
To mitigate CVE-2024-48052, organizations should first upgrade Gradio to a version where this vulnerability is patched once available. Until an official patch is released, consider the following specific actions: 1) Implement strict input validation and URL allowlisting on any user-supplied URLs processed by gr.DownloadButton or related functions to restrict requests to trusted domains only. 2) Employ network-level controls such as firewall rules or egress filtering to prevent the Gradio server from making outbound requests to internal or sensitive network segments. 3) Run Gradio services with the least privilege necessary, limiting access to sensitive files and internal resources. 4) Monitor application logs for unusual or unexpected URL requests that could indicate exploitation attempts. 5) If feasible, isolate the Gradio server in a segmented network zone with restricted access to internal resources. 6) Educate developers and administrators about SSRF risks and secure coding practices to prevent similar vulnerabilities. 7) Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, India, Netherlands
CVE-2024-48052: n/a
Description
In gradio <=4.42.0, the gr.DownloadButton function has a hidden server-side request forgery (SSRF) vulnerability. The reason is that within the save_url_to_cache function, there are no restrictions on the URL, which allows access to local target resources. This can lead to the download of local resources and sensitive information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-48052 is a server-side request forgery (SSRF) vulnerability affecting Gradio, an open-source Python library used to build machine learning and data science web applications. Specifically, the vulnerability exists in the gr.DownloadButton function in versions up to 4.42.0. The root cause lies in the save_url_to_cache function, which processes URLs without applying any restrictions or validation. This lack of validation allows an attacker to supply arbitrary URLs, including those pointing to internal or local network resources. When the server processes these URLs, it fetches the content and caches it, effectively enabling an attacker to retrieve sensitive internal files or services that are otherwise inaccessible externally. The vulnerability requires the attacker to have some level of privileges (PR:L), meaning they must have limited access to the system or application, but does not require user interaction. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the high confidentiality impact but no impact on integrity or availability. The attack vector is network-based (AV:N), and the scope is unchanged (S:U). No known exploits have been reported in the wild, and no official patches have been linked yet. This vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
The primary impact of CVE-2024-48052 is the unauthorized disclosure of sensitive information residing on internal or local network resources accessible to the vulnerable Gradio server. Attackers exploiting this vulnerability can bypass network segmentation and firewall protections by leveraging the server as a proxy to access internal endpoints, configuration files, or other sensitive data. This can lead to data leakage of confidential information, intellectual property, or credentials stored on internal systems. While the vulnerability does not allow modification of data or denial of service, the confidentiality breach alone can have severe consequences, including regulatory non-compliance, reputational damage, and facilitation of further attacks such as lateral movement within an organization’s network. Organizations deploying Gradio in production environments, especially those exposing the application to untrusted users or the internet, face increased risk. The vulnerability’s exploitation requires some level of access, so insider threats or compromised accounts could be leveraged to exploit it. The absence of known exploits currently reduces immediate risk but does not eliminate the threat as attackers may develop exploits once the vulnerability is publicly disclosed.
Mitigation Recommendations
To mitigate CVE-2024-48052, organizations should first upgrade Gradio to a version where this vulnerability is patched once available. Until an official patch is released, consider the following specific actions: 1) Implement strict input validation and URL allowlisting on any user-supplied URLs processed by gr.DownloadButton or related functions to restrict requests to trusted domains only. 2) Employ network-level controls such as firewall rules or egress filtering to prevent the Gradio server from making outbound requests to internal or sensitive network segments. 3) Run Gradio services with the least privilege necessary, limiting access to sensitive files and internal resources. 4) Monitor application logs for unusual or unexpected URL requests that could indicate exploitation attempts. 5) If feasible, isolate the Gradio server in a segmented network zone with restricted access to internal resources. 6) Educate developers and administrators about SSRF risks and secure coding practices to prevent similar vulnerabilities. 7) Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d09b7ef31ef0b56d657
Added to database: 2/25/2026, 9:43:37 PM
Last enriched: 2/28/2026, 7:36:02 AM
Last updated: 4/12/2026, 7:54:14 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.