VYPR
Moderate severityNVD Advisory· Published Nov 4, 2024· Updated Nov 6, 2024

CVE-2024-48052

CVE-2024-48052

Description

In gradio <=4.42.0, the gr.DownloadButton function has a hidden server-side request forgery (SSRF) vulnerability. The reason is that within the save_url_to_cache function, there are no restrictions on the URL, which allows access to local target resources. This can lead to the download of local resources and sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Gradio <=4.42.0 has a SSRF vulnerability in gr.DownloadButton's save_url_to_cache function, allowing unauthorized access to local resources.

Vulnerability

Overview

A server-side request forgery (SSRF) vulnerability exists in Gradio versions up to and including 4.42.0 [2]. The flaw resides in the gr.DownloadButton component, specifically within the save_url_to_cache function. This function fails to validate or restrict the URLs it processes, enabling an attacker to craft requests that target internal or local resources [3].

Exploitation

An attacker can exploit this vulnerability by providing a malicious URL to the download button interface. Because no restrictions are applied, the server will make requests to arbitrary destinations, including loopback addresses (e.g., 127.0.0.1) or internal network services. No authentication is required to trigger the vulnerable code path [2][3].

Impact

Successful exploitation allows an attacker to read sensitive local files, interact with internal services, or exfiltrate data. This could lead to disclosure of confidential information or further compromise of the host system [3]. Given Gradio's use in sharing machine learning demos, this poses a significant risk to users hosting applications that expose the download functionality [1].

Mitigation

As of the advisory, no patch has been released. Users are advised to upgrade to a patched version when available or to restrict access to the download button and monitor for suspicious requests [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gradioPyPI
<= 4.42.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.