Path Traversal in gradio-app/gradio
Description
A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in Gradio Audio component lets attackers control audio format, resetting any file to empty, causing denial of service.
Vulnerability
Overview
A path traversal vulnerability exists in the Gradio Audio component as of commit 98cbcae. The flaw allows an attacker to manipulate the output format of audio files, which can lead to arbitrary file content deletion. By controlling the format, an attacker can reset any file to an empty file, effectively causing a denial of service (DOS) on the server [1][3].
Exploitation
Method
The vulnerability is triggered through the Audio component's processing logic. The attacker can influence the format parameter during audio file conversion, which is then used to write the output. Due to insufficient input validation, this can be leveraged to overwrite unintended files by controlling the path or content of the output file. The attack does not require authentication beyond accessing the Gradio interface [1][4].
Impact
Successful exploitation allows an attacker to delete the content of arbitrary files on the server, resetting them to empty. This can lead to denial of service, data loss, or disruption of the Gradio application's functionality. The vulnerability is rated with a CVSS v4.0 vector, although NVD assessment is not yet provided [3].
Mitigation
As of the published information, the vulnerability affects a specific Git commit (98cbcae). Users are advised to update to a patched version of Gradio or apply any available workarounds recommended by the vendor. The vulnerability was reported via the Huntr bug bounty platform, indicating active disclosure [4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
gradioPyPI | >= 4.0.0, <= 5.0.0b2 | — |
Affected products
3- gradio-app/gradio-app/gradiov5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.