VYPR
Moderate severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

Open Redirect in gradio-app/gradio

CVE-2024-8021

Description

An open redirect vulnerability exists in the latest version of gradio-app/gradio. The vulnerability allows an attacker to redirect users to a malicious website by URL encoding. This can be exploited by sending a crafted request to the application, which results in a 302 redirect to an attacker-controlled site.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An open redirect vulnerability in Gradio allows attackers to redirect users to malicious sites via crafted URL encoding.

Vulnerability

Overview

CVE-2024-8021 describes an open redirect vulnerability in Gradio, a Python library for building machine learning demos. The vulnerability stems from improper validation of user-supplied input, allowing an attacker to manipulate URL parameters to redirect users to arbitrary external domains via a 302 redirect. This is achieved by URL encoding the malicious destination within a request to the application.

Exploitation

An attacker can exploit this vulnerability by crafting a request that includes a URL-encoded payload targeting the redirect mechanism. No authentication is required, as the vulnerability is present in the default configuration. The attack can be performed remotely, making it accessible to any user who can interact with the Gradio application. The application returns a 302 redirect response, transparently sending the user to the attacker-controlled site.

Impact

Successful exploitation enables an attacker to redirect users to phishing pages, malware distribution sites, or other malicious destinations. This undermines the trustworthiness of the Gradio application and can lead to credential theft or further compromise. The vulnerability is classified as an open redirect, which is often used in social engineering attacks.

Mitigation

Status

As of the publication date, Gradio has not released a patch for this vulnerability. Administrators should monitor the official repository for updates and consider implementing input validation or a web application firewall to mitigate the risk. The vulnerability was reported via the Huntr bug bounty platform [3] and is acknowledged on the NVD [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gradioPyPI
<= 4.37.2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.