Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. gradio
  4. ›
  5. CVE-2024-47871

CVE-2024-47871: Gradio uses insecure communication between the FRP client and server

October 10, 2024 (updated January 21, 2025)

What kind of vulnerability is it? Who is impacted?

This vulnerability involves insecure communication between the FRP (Fast Reverse Proxy) client and server when Gradio’s share=True option is used. HTTPS is not enforced on the connection, allowing attackers to intercept and read files uploaded to the Gradio server, as well as modify responses or data sent between the client and server. This impacts users who are sharing Gradio demos publicly over the internet using share=True without proper encryption, exposing sensitive data to potential eavesdroppers.

References

  • github.com/advisories/GHSA-279j-x4gx-hfrh
  • github.com/gradio-app/gradio
  • github.com/gradio-app/gradio/security/advisories/GHSA-279j-x4gx-hfrh
  • github.com/pypa/advisory-database/tree/main/vulns/gradio/PYSEC-2024-219.yaml
  • nvd.nist.gov/vuln/detail/CVE-2024-47871

Code Behaviors & Features

Detect and mitigate CVE-2024-47871 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.0.0

Fixed versions

  • 5.0.0

Solution

Upgrade to version 5.0.0 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-311: Missing Encryption of Sensitive Data

Source file

pypi/gradio/CVE-2024-47871.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:32 +0000.