An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.
History

Tue, 29 Jul 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Gradio Project
Gradio Project gradio
CPEs cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
Vendors & Products Gradio Project
Gradio Project gradio
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-03-27T00:00:32.469Z

Updated: 2024-08-01T19:03:39.317Z

Reserved: 2024-03-05T22:12:54.017Z

Link: CVE-2024-2206

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.317Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-27T01:15:46.613

Modified: 2025-07-29T20:24:44.737

Link: CVE-2024-2206

cve-icon Redhat

No data.