CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio
Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue.
AI Analysis
Technical Summary
Gradio is an open-source Python package widely used for rapid prototyping of machine learning and data science applications. Prior to version 6.7, Gradio apps running on Windows with Python 3.13 or newer are vulnerable to an absolute path traversal vulnerability (CWE-36). This vulnerability arises because Python 3.13 changed the behavior of the os.path.isabs function: root-relative paths such as '/windows/win.ini' on Windows are no longer considered absolute paths. Gradio's internal logic for safely joining paths relies on os.path.isabs to validate user-supplied file paths. Due to the changed behavior, Gradio incorrectly treats certain root-relative paths as relative, allowing attackers to craft path traversal payloads that bypass intended path restrictions. Consequently, unauthenticated attackers can read arbitrary files on the server hosting the Gradio app, potentially exposing sensitive data. The vulnerability does not require authentication or user interaction and affects all Gradio versions before 6.7 running on Windows with Python 3.13+. The issue is resolved in Gradio 6.7 by updating the path validation logic to accommodate the new os.path.isabs behavior. No public exploits have been reported yet, but the vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to its ease of exploitation and impact on confidentiality.
Potential Impact
The primary impact of CVE-2026-28414 is unauthorized disclosure of sensitive information from the file system of servers running vulnerable Gradio applications on Windows with Python 3.13+. Attackers can read arbitrary files without authentication, potentially exposing credentials, configuration files, source code, or other confidential data. This can lead to further attacks such as credential theft, lateral movement, or data leakage. Since Gradio is often used in data science and machine learning environments, exposure of proprietary models or datasets is also a risk. The vulnerability does not affect integrity or availability directly but compromises confidentiality significantly. Organizations relying on Gradio for internal or external-facing applications face increased risk of data breaches. The ease of exploitation and lack of required authentication make this a critical concern for affected deployments worldwide.
Mitigation Recommendations
The most effective mitigation is to upgrade Gradio to version 6.7 or later, where the path traversal issue is fixed. Organizations should audit their environments to identify Gradio instances running on Windows with Python 3.13+ and update them promptly. If immediate upgrade is not feasible, as a temporary measure, restrict network access to Gradio applications to trusted users only, minimizing exposure to unauthenticated attackers. Additionally, implement strict file system permissions to limit the files accessible to the Gradio process. Monitoring and logging access to sensitive files can help detect exploitation attempts. Developers should review any custom path handling code for compatibility with Python 3.13 changes and avoid relying solely on os.path.isabs for security-critical path validation. Employing application-layer firewalls or reverse proxies to filter malicious requests may also reduce risk until patches are applied.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, South Korea, Australia, Netherlands, India
CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio
Description
Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Gradio is an open-source Python package widely used for rapid prototyping of machine learning and data science applications. Prior to version 6.7, Gradio apps running on Windows with Python 3.13 or newer are vulnerable to an absolute path traversal vulnerability (CWE-36). This vulnerability arises because Python 3.13 changed the behavior of the os.path.isabs function: root-relative paths such as '/windows/win.ini' on Windows are no longer considered absolute paths. Gradio's internal logic for safely joining paths relies on os.path.isabs to validate user-supplied file paths. Due to the changed behavior, Gradio incorrectly treats certain root-relative paths as relative, allowing attackers to craft path traversal payloads that bypass intended path restrictions. Consequently, unauthenticated attackers can read arbitrary files on the server hosting the Gradio app, potentially exposing sensitive data. The vulnerability does not require authentication or user interaction and affects all Gradio versions before 6.7 running on Windows with Python 3.13+. The issue is resolved in Gradio 6.7 by updating the path validation logic to accommodate the new os.path.isabs behavior. No public exploits have been reported yet, but the vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to its ease of exploitation and impact on confidentiality.
Potential Impact
The primary impact of CVE-2026-28414 is unauthorized disclosure of sensitive information from the file system of servers running vulnerable Gradio applications on Windows with Python 3.13+. Attackers can read arbitrary files without authentication, potentially exposing credentials, configuration files, source code, or other confidential data. This can lead to further attacks such as credential theft, lateral movement, or data leakage. Since Gradio is often used in data science and machine learning environments, exposure of proprietary models or datasets is also a risk. The vulnerability does not affect integrity or availability directly but compromises confidentiality significantly. Organizations relying on Gradio for internal or external-facing applications face increased risk of data breaches. The ease of exploitation and lack of required authentication make this a critical concern for affected deployments worldwide.
Mitigation Recommendations
The most effective mitigation is to upgrade Gradio to version 6.7 or later, where the path traversal issue is fixed. Organizations should audit their environments to identify Gradio instances running on Windows with Python 3.13+ and update them promptly. If immediate upgrade is not feasible, as a temporary measure, restrict network access to Gradio applications to trusted users only, minimizing exposure to unauthenticated attackers. Additionally, implement strict file system permissions to limit the files accessible to the Gradio process. Monitoring and logging access to sensitive files can help detect exploitation attempts. Developers should review any custom path handling code for compatibility with Python 3.13 changes and avoid relying solely on os.path.isabs for security-critical path validation. Employing application-layer firewalls or reverse proxies to filter malicious requests may also reduce risk until patches are applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:33:57.289Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a212fb32ffcdb8a277777c
Added to database: 2/27/2026, 9:56:11 PM
Last enriched: 3/7/2026, 9:18:41 PM
Last updated: 4/13/2026, 1:09:56 AM
Views: 291
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.