Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-28416

Опубликовано: 27 фев. 2026
Источник: redhat
CVSS3: 8.2
EPSS Низкий

Описание

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses gr.load() to load an attacker-controlled Space, the malicious proxy_url from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.

A flaw was found in Gradio, an open-source Python package for rapid prototyping. A remote attacker can exploit a Server-Side Request Forgery (SSRF) vulnerability by hosting a malicious Gradio Space. When a victim application uses gr.load() to load this attacker-controlled Space, a malicious proxy_url from the configuration is trusted. This allows the attacker to make arbitrary HTTP requests from the victim's server, potentially accessing internal services, cloud metadata endpoints, and private networks through the victim's infrastructure.

Отчет

This is an IMPORTANT Server-Side Request Forgery (SSRF) vulnerability in Gradio, affecting the ansible-chatbot-service within Red Hat Ansible Services. The flaw allows an attacker to make arbitrary HTTP requests from a victim's server by injecting a malicious proxy_url when the application uses gr.load() to load an attacker-controlled Gradio Space. This could lead to unauthorized access to internal services, cloud metadata, and private networks.

Меры по смягчению последствий

To mitigate this vulnerability, avoid loading Gradio Spaces from untrusted or unverified sources when using gr.load() in applications like the Ansible Chatbot Service. Additionally, implement network egress filtering to restrict outbound connections from systems running Gradio applications, preventing access to internal network resources, cloud metadata endpoints, and private networks.

Дополнительная информация

Статус:

Important
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2443453Gradio: Gradio: Server-Side Request Forgery allows access to internal services via malicious Space loading

EPSS

Процентиль: 3%
0.00016
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
28 дней назад

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.

CVSS3: 8.2
github
27 дней назад

Gradio has SSRF via Malicious `proxy_url` Injection in `gr.load()` Config Processing

EPSS

Процентиль: 3%
0.00016
Низкий

8.2 High

CVSS3