Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio

0
High
VulnerabilityCVE-2026-28414cvecve-2026-28414cwe-36
Published: Fri Feb 27 2026 (02/27/2026, 21:43:28 UTC)
Source: CVE Database V5
Vendor/Project: gradio-app
Product: gradio

Description

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:18:41 UTC

Technical Analysis

Gradio is an open-source Python package widely used for rapid prototyping of machine learning and data science applications. Prior to version 6.7, Gradio apps running on Windows with Python 3.13 or newer are vulnerable to an absolute path traversal vulnerability (CWE-36). This vulnerability arises because Python 3.13 changed the behavior of the os.path.isabs function: root-relative paths such as '/windows/win.ini' on Windows are no longer considered absolute paths. Gradio's internal logic for safely joining paths relies on os.path.isabs to validate user-supplied file paths. Due to the changed behavior, Gradio incorrectly treats certain root-relative paths as relative, allowing attackers to craft path traversal payloads that bypass intended path restrictions. Consequently, unauthenticated attackers can read arbitrary files on the server hosting the Gradio app, potentially exposing sensitive data. The vulnerability does not require authentication or user interaction and affects all Gradio versions before 6.7 running on Windows with Python 3.13+. The issue is resolved in Gradio 6.7 by updating the path validation logic to accommodate the new os.path.isabs behavior. No public exploits have been reported yet, but the vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to its ease of exploitation and impact on confidentiality.

Potential Impact

The primary impact of CVE-2026-28414 is unauthorized disclosure of sensitive information from the file system of servers running vulnerable Gradio applications on Windows with Python 3.13+. Attackers can read arbitrary files without authentication, potentially exposing credentials, configuration files, source code, or other confidential data. This can lead to further attacks such as credential theft, lateral movement, or data leakage. Since Gradio is often used in data science and machine learning environments, exposure of proprietary models or datasets is also a risk. The vulnerability does not affect integrity or availability directly but compromises confidentiality significantly. Organizations relying on Gradio for internal or external-facing applications face increased risk of data breaches. The ease of exploitation and lack of required authentication make this a critical concern for affected deployments worldwide.

Mitigation Recommendations

The most effective mitigation is to upgrade Gradio to version 6.7 or later, where the path traversal issue is fixed. Organizations should audit their environments to identify Gradio instances running on Windows with Python 3.13+ and update them promptly. If immediate upgrade is not feasible, as a temporary measure, restrict network access to Gradio applications to trusted users only, minimizing exposure to unauthenticated attackers. Additionally, implement strict file system permissions to limit the files accessible to the Gradio process. Monitoring and logging access to sensitive files can help detect exploitation attempts. Developers should review any custom path handling code for compatibility with Python 3.13 changes and avoid relying solely on os.path.isabs for security-critical path validation. Employing application-layer firewalls or reverse proxies to filter malicious requests may also reduce risk until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:33:57.289Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a212fb32ffcdb8a277777c

Added to database: 2/27/2026, 9:56:11 PM

Last enriched: 3/7/2026, 9:18:41 PM

Last updated: 4/13/2026, 1:09:56 AM

Views: 291

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses