Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. gradio
  4. ›
  5. CVE-2025-23042

CVE-2025-23042: Gradio Blocked Path ACL Bypass Vulnerability

January 14, 2025

Gradio’s Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected.

This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio’s security model. Given Gradio’s popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments.

References

  • github.com/advisories/GHSA-j2jg-fq62-7c3h
  • github.com/gradio-app/gradio
  • github.com/gradio-app/gradio/commit/6b63fdec441b5c9bf910f910a2505d8defbb6bf8
  • github.com/gradio-app/gradio/releases/tag/gradio%405.11.0
  • github.com/gradio-app/gradio/security/advisories/GHSA-j2jg-fq62-7c3h
  • nvd.nist.gov/vuln/detail/CVE-2025-23042

Code Behaviors & Features

Detect and mitigate CVE-2025-23042 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.11.0

Fixed versions

  • 5.11.0

Solution

Upgrade to version 5.11.0 or above.

Weakness

  • CWE-178: Improper Handling of Case Sensitivity

Source file

pypi/gradio/CVE-2025-23042.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:35 +0000.