CVE-2025-23042: Gradio Blocked Path ACL Bypass Vulnerability
Gradio’s Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected.
This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio’s security model. Given Gradio’s popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments.
References
- github.com/advisories/GHSA-j2jg-fq62-7c3h
- github.com/gradio-app/gradio
- github.com/gradio-app/gradio/commit/6b63fdec441b5c9bf910f910a2505d8defbb6bf8
- github.com/gradio-app/gradio/releases/tag/gradio%405.11.0
- github.com/gradio-app/gradio/security/advisories/GHSA-j2jg-fq62-7c3h
- nvd.nist.gov/vuln/detail/CVE-2025-23042
Detect and mitigate CVE-2025-23042 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →