CVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.
AI Analysis
Technical Summary
Gradio is an open-source Python package widely used for rapid prototyping of machine learning and data science applications. Prior to version 6.6.0, Gradio contained a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-28416 (CWE-918). The vulnerability occurs when an application uses the gr.load() function to load a Gradio Space controlled by an attacker. The malicious Space can specify a proxy_url in its configuration, which Gradio mistakenly trusts and adds to its internal allowlist. This trust enables the attacker to coerce the victim's server to send arbitrary HTTP requests to internal resources such as private network services, cloud provider metadata endpoints (e.g., AWS, GCP, Azure), or other sensitive infrastructure components that are not normally accessible externally. Because the attacker can leverage the victim's infrastructure to pivot into internal networks, this SSRF flaw can lead to unauthorized information disclosure and potentially facilitate further attacks. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The CVSS 3.1 base score is 8.2, reflecting high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact with limited integrity impact. The vulnerability was publicly disclosed on February 27, 2026, and fixed in Gradio version 6.6.0. No known exploits in the wild have been reported yet. However, given Gradio's popularity in data science and ML communities, the risk remains significant for organizations using vulnerable versions and loading untrusted Spaces.
Potential Impact
The primary impact of this SSRF vulnerability is unauthorized access to internal services and sensitive metadata endpoints within an organization's infrastructure. Attackers can exploit this to gather confidential information such as cloud instance credentials, internal APIs, or private network resources that are otherwise inaccessible externally. This can lead to data breaches, lateral movement within networks, and potential escalation of privileges. Organizations relying on Gradio for prototyping or production ML applications that load external Spaces are at risk of having their internal environment exposed. The vulnerability affects confidentiality most severely, with some integrity risk if attackers leverage the information gained to manipulate internal services. Availability impact is minimal. Because exploitation requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of successful exploitation if untrusted Spaces are loaded. This can undermine trust in ML deployment pipelines and expose critical infrastructure in cloud and enterprise environments.
Mitigation Recommendations
The most effective mitigation is to upgrade all Gradio installations to version 6.6.0 or later, where this SSRF vulnerability is fixed. Organizations should audit their codebases and deployment configurations to identify any usage of gr.load() that loads external or untrusted Gradio Spaces and eliminate or restrict such usage. Implement strict allowlisting of trusted Spaces and avoid dynamically loading Spaces from unknown sources. Network-level controls such as egress filtering and segmentation can limit the ability of compromised applications to reach sensitive internal endpoints or cloud metadata services. Monitoring and logging HTTP requests originating from Gradio applications can help detect anomalous SSRF attempts. Additionally, applying the principle of least privilege to cloud instance metadata access and internal services reduces the impact if SSRF occurs. Security teams should educate developers about the risks of loading untrusted Spaces and incorporate dependency management practices to ensure timely patching of Gradio and related components.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, Australia, India, Netherlands, South Korea
CVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
Description
Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
Gradio is an open-source Python package widely used for rapid prototyping of machine learning and data science applications. Prior to version 6.6.0, Gradio contained a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-28416 (CWE-918). The vulnerability occurs when an application uses the gr.load() function to load a Gradio Space controlled by an attacker. The malicious Space can specify a proxy_url in its configuration, which Gradio mistakenly trusts and adds to its internal allowlist. This trust enables the attacker to coerce the victim's server to send arbitrary HTTP requests to internal resources such as private network services, cloud provider metadata endpoints (e.g., AWS, GCP, Azure), or other sensitive infrastructure components that are not normally accessible externally. Because the attacker can leverage the victim's infrastructure to pivot into internal networks, this SSRF flaw can lead to unauthorized information disclosure and potentially facilitate further attacks. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The CVSS 3.1 base score is 8.2, reflecting high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact with limited integrity impact. The vulnerability was publicly disclosed on February 27, 2026, and fixed in Gradio version 6.6.0. No known exploits in the wild have been reported yet. However, given Gradio's popularity in data science and ML communities, the risk remains significant for organizations using vulnerable versions and loading untrusted Spaces.
Potential Impact
The primary impact of this SSRF vulnerability is unauthorized access to internal services and sensitive metadata endpoints within an organization's infrastructure. Attackers can exploit this to gather confidential information such as cloud instance credentials, internal APIs, or private network resources that are otherwise inaccessible externally. This can lead to data breaches, lateral movement within networks, and potential escalation of privileges. Organizations relying on Gradio for prototyping or production ML applications that load external Spaces are at risk of having their internal environment exposed. The vulnerability affects confidentiality most severely, with some integrity risk if attackers leverage the information gained to manipulate internal services. Availability impact is minimal. Because exploitation requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of successful exploitation if untrusted Spaces are loaded. This can undermine trust in ML deployment pipelines and expose critical infrastructure in cloud and enterprise environments.
Mitigation Recommendations
The most effective mitigation is to upgrade all Gradio installations to version 6.6.0 or later, where this SSRF vulnerability is fixed. Organizations should audit their codebases and deployment configurations to identify any usage of gr.load() that loads external or untrusted Gradio Spaces and eliminate or restrict such usage. Implement strict allowlisting of trusted Spaces and avoid dynamically loading Spaces from unknown sources. Network-level controls such as egress filtering and segmentation can limit the ability of compromised applications to reach sensitive internal endpoints or cloud metadata services. Monitoring and logging HTTP requests originating from Gradio applications can help detect anomalous SSRF attempts. Additionally, applying the principle of least privilege to cloud instance metadata access and internal services reduces the impact if SSRF occurs. Security teams should educate developers about the risks of loading untrusted Spaces and incorporate dependency management practices to ensure timely patching of Gradio and related components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:33:57.289Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a212fb32ffcdb8a2777772
Added to database: 2/27/2026, 9:56:11 PM
Last enriched: 2/27/2026, 10:11:48 PM
Last updated: 2/27/2026, 11:08:40 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28426: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
HighCVE-2025-11252: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Signum Technology Promotion and Training Inc. windesk.fm
CriticalCVE-2026-2647
UnknownCVE-2026-28425: CWE-94: Improper Control of Generation of Code ('Code Injection') in statamic cms
HighCVE-2026-28424: CWE-862: Missing Authorization in statamic cms
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.