Open Redirect in gradio-app/gradio
Description
An open redirect vulnerability exists in the latest version of gradio-app/gradio. The vulnerability allows an attacker to redirect users to a malicious website by URL encoding. This can be exploited by sending a crafted request to the application, which results in a 302 redirect to an attacker-controlled site.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An open redirect vulnerability in Gradio allows attackers to redirect users to malicious sites via crafted URL encoding.
Vulnerability
Overview
CVE-2024-8021 describes an open redirect vulnerability in Gradio, a Python library for building machine learning demos. The vulnerability stems from improper validation of user-supplied input, allowing an attacker to manipulate URL parameters to redirect users to arbitrary external domains via a 302 redirect. This is achieved by URL encoding the malicious destination within a request to the application.
Exploitation
An attacker can exploit this vulnerability by crafting a request that includes a URL-encoded payload targeting the redirect mechanism. No authentication is required, as the vulnerability is present in the default configuration. The attack can be performed remotely, making it accessible to any user who can interact with the Gradio application. The application returns a 302 redirect response, transparently sending the user to the attacker-controlled site.
Impact
Successful exploitation enables an attacker to redirect users to phishing pages, malware distribution sites, or other malicious destinations. This undermines the trustworthiness of the Gradio application and can lead to credential theft or further compromise. The vulnerability is classified as an open redirect, which is often used in social engineering attacks.
Mitigation
Status
As of the publication date, Gradio has not released a patch for this vulnerability. Administrators should monitor the official repository for updates and consider implementing input validation or a web application firewall to mitigate the risk. The vulnerability was reported via the Huntr bug bounty platform [3] and is acknowledged on the NVD [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
gradioPyPI | <= 4.37.2 | — |
Affected products
3- gradio-app/gradio-app/gradiov5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.