Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. gradio
  4. ›
  5. CVE-2024-47870

CVE-2024-47870: Gradio has a race condition in update_root_in_config may redirect user traffic

October 10, 2024 (updated January 21, 2025)

What kind of vulnerability is it? Who is impacted?

This vulnerability involves a race condition in the update_root_in_config function, allowing an attacker to modify the root URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition.

References

  • github.com/advisories/GHSA-xh2x-3mrm-fwqm
  • github.com/gradio-app/gradio
  • github.com/gradio-app/gradio/security/advisories/GHSA-xh2x-3mrm-fwqm
  • github.com/pypa/advisory-database/tree/main/vulns/gradio/PYSEC-2024-218.yaml
  • nvd.nist.gov/vuln/detail/CVE-2024-47870

Code Behaviors & Features

Detect and mitigate CVE-2024-47870 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.0.0

Fixed versions

  • 5.0.0

Solution

Upgrade to version 5.0.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Source file

pypi/gradio/CVE-2024-47870.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:28 +0000.