VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

Zip Bomb Vulnerability in gradio-app/gradio

CVE-2024-10569

Description

A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed files. An attacker can exploit this by uploading a maliciously crafted zip bomb, leading to a server crash and causing a denial of service.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Gradio's dataframe component accepts compressed files without size validation, enabling a denial-of-service zip bomb attack via malicious uploads.

Vulnerability

Summary

The dataframe component in gradio-app/gradio (commit 98cbcae) contains a denial-of-service vulnerability stemming from how it processes user-supplied input data. The component uses pd.read_csv to parse uploaded files, which inherently supports compressed file formats such as ZIP archives [1][2]. This design choice, combined with a lack of input size or decompression restrictions, allows an attacker to supply a maliciously crafted compressed file—commonly known as a zip bomb—that expands massively during decompression, consuming server memory and CPU resources until the process crashes [2].

Attack

Surface and Exploitation

The vulnerability is exploitable over the network without authentication; any user who can upload a file to a Gradio application can trigger the attack. The affected code is located in gradio/components/dataframe.py at the point where pd.read_csv is called on a user-supplied file [3]. By submitting a file that is small when compressed but decompresses to an enormous size (e.g., multiple terabytes of repeated data), an adversary can exhaust the server's resources, leading to a denial of service. No special privileges or prior access are required beyond the ability to interact with the Gradio interface's file upload component [2].

Impact and

Mitigation

Successful exploitation results in a server crash, making the Gradio application unavailable to legitimate users—a classic denial-of-service outcome [2]. The vulnerability was disclosed through the Huntr bug bounty platform [4]. As of the publication date of this CVE, the fix status is not explicitly detailed in the provided references, but users are advised to update to the latest version of Gradio or implement input size limits and validate file signatures before processing. Until a patch is applied, operators should consider restricting file uploads or disabling the dataframe component in untrusted environments [2][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gradioPyPI
>= 4.0.0, <= 5.0.0b2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.