An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gradio Project
Gradio Project gradio |
|
CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
Vendors & Products |
Gradio Project
Gradio Project gradio |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-03-27T00:00:32.469Z
Updated: 2024-08-01T19:03:39.317Z
Reserved: 2024-03-05T22:12:54.017Z
Link: CVE-2024-2206

Updated: 2024-08-01T19:03:39.317Z

Status : Analyzed
Published: 2024-03-27T01:15:46.613
Modified: 2025-07-29T20:24:44.737
Link: CVE-2024-2206

No data.