CVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.
AI Analysis
Technical Summary
Gradio is a popular open-source Python package designed for rapid prototyping of machine learning and data science interfaces. Prior to version 6.6.0, Gradio contained a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-28416 (CWE-918). The vulnerability occurs when a victim application uses the gr.load() function to load a Gradio Space controlled by an attacker. The attack vector involves the malicious Space specifying a proxy_url in its configuration, which the vulnerable Gradio client trusts and adds to an internal allowlist without proper validation. This trust allows the attacker to coerce the victim server into making arbitrary HTTP requests to internal or protected resources, such as internal services, cloud provider metadata endpoints (e.g., AWS, Azure, GCP metadata APIs), or other private network assets. Because the victim server performs these requests, the attacker can bypass network restrictions and gain sensitive information or perform further attacks. The vulnerability requires no authentication or user interaction, making exploitation straightforward once the victim loads the malicious Space. The issue was addressed in Gradio version 6.6.0 by properly validating and restricting the proxy_url parameter, preventing unauthorized requests. No known exploits in the wild have been reported as of the publication date. The vulnerability has a CVSS 3.1 base score of 8.2, reflecting its high impact on confidentiality and ease of exploitation.
Potential Impact
The SSRF vulnerability in Gradio can have severe consequences for organizations using vulnerable versions, especially those deploying Gradio in cloud or internal network environments. Attackers can leverage this flaw to access sensitive internal services that are otherwise inaccessible externally, including cloud metadata endpoints that often contain credentials or tokens. This can lead to unauthorized disclosure of confidential information, such as cloud instance credentials, internal APIs, or private data stores. Additionally, attackers may use the SSRF to pivot within the victim's network, potentially escalating attacks or causing further compromise. The vulnerability does not directly impact availability or integrity but poses a significant confidentiality risk. Organizations relying on Gradio for rapid prototyping or internal tools may inadvertently expose critical infrastructure. Given the ease of exploitation without authentication or user interaction, the threat is substantial. Although no active exploitation is reported, the potential for damage is high, especially in cloud-heavy environments or organizations with sensitive internal services.
Mitigation Recommendations
Organizations should immediately upgrade Gradio to version 6.6.0 or later, where the SSRF vulnerability is fixed. Until upgrading, avoid loading untrusted or attacker-controlled Gradio Spaces using gr.load(). Implement network-level controls to restrict outbound HTTP requests from servers running Gradio, limiting access to only necessary external endpoints and blocking internal metadata or private network addresses. Employ strict input validation and sanitization for any user-supplied URLs or proxy configurations in Gradio Spaces. Monitor network traffic for unusual outbound requests originating from Gradio servers, especially to internal IP ranges or cloud metadata endpoints. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with rules targeting SSRF patterns. Educate developers and users about the risks of loading untrusted Spaces and enforce policies to only use vetted Spaces. Finally, conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in development and production environments.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Australia, Netherlands, India, Japan, South Korea
CVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
Description
Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Gradio is a popular open-source Python package designed for rapid prototyping of machine learning and data science interfaces. Prior to version 6.6.0, Gradio contained a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-28416 (CWE-918). The vulnerability occurs when a victim application uses the gr.load() function to load a Gradio Space controlled by an attacker. The attack vector involves the malicious Space specifying a proxy_url in its configuration, which the vulnerable Gradio client trusts and adds to an internal allowlist without proper validation. This trust allows the attacker to coerce the victim server into making arbitrary HTTP requests to internal or protected resources, such as internal services, cloud provider metadata endpoints (e.g., AWS, Azure, GCP metadata APIs), or other private network assets. Because the victim server performs these requests, the attacker can bypass network restrictions and gain sensitive information or perform further attacks. The vulnerability requires no authentication or user interaction, making exploitation straightforward once the victim loads the malicious Space. The issue was addressed in Gradio version 6.6.0 by properly validating and restricting the proxy_url parameter, preventing unauthorized requests. No known exploits in the wild have been reported as of the publication date. The vulnerability has a CVSS 3.1 base score of 8.2, reflecting its high impact on confidentiality and ease of exploitation.
Potential Impact
The SSRF vulnerability in Gradio can have severe consequences for organizations using vulnerable versions, especially those deploying Gradio in cloud or internal network environments. Attackers can leverage this flaw to access sensitive internal services that are otherwise inaccessible externally, including cloud metadata endpoints that often contain credentials or tokens. This can lead to unauthorized disclosure of confidential information, such as cloud instance credentials, internal APIs, or private data stores. Additionally, attackers may use the SSRF to pivot within the victim's network, potentially escalating attacks or causing further compromise. The vulnerability does not directly impact availability or integrity but poses a significant confidentiality risk. Organizations relying on Gradio for rapid prototyping or internal tools may inadvertently expose critical infrastructure. Given the ease of exploitation without authentication or user interaction, the threat is substantial. Although no active exploitation is reported, the potential for damage is high, especially in cloud-heavy environments or organizations with sensitive internal services.
Mitigation Recommendations
Organizations should immediately upgrade Gradio to version 6.6.0 or later, where the SSRF vulnerability is fixed. Until upgrading, avoid loading untrusted or attacker-controlled Gradio Spaces using gr.load(). Implement network-level controls to restrict outbound HTTP requests from servers running Gradio, limiting access to only necessary external endpoints and blocking internal metadata or private network addresses. Employ strict input validation and sanitization for any user-supplied URLs or proxy configurations in Gradio Spaces. Monitor network traffic for unusual outbound requests originating from Gradio servers, especially to internal IP ranges or cloud metadata endpoints. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with rules targeting SSRF patterns. Educate developers and users about the risks of loading untrusted Spaces and enforce policies to only use vetted Spaces. Finally, conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in development and production environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:33:57.289Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a212fb32ffcdb8a2777772
Added to database: 2/27/2026, 9:56:11 PM
Last enriched: 3/7/2026, 9:19:59 PM
Last updated: 4/13/2026, 5:56:18 PM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.