Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.5

Gradio on Windows with Python 3.13+: Unauthenticated File Access

CVE-2026-28414 GHSA-39mp-8hj3-5c49
Summary

Gradio apps on Windows with Python 3.13+ can be hacked to access any file on the system without a password. This is a security risk because an attacker can read sensitive files. To protect your app, update to a version of Gradio that fixes this issue or use a different version of Python.

What to do
  • Update gradio to version 6.7.0.
Affected software
VendorProductAffected versionsFix available
gradio <= 6.7.0 6.7.0
gradio_project gradio <= 6.7.0
Original title
Gradio is Vulnerable to Absolute Path Traversal on Windows with Python 3.13+
Original description
### Summary
Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system.

### Details
Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely.

This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication.

### PoC
```
% curl http://10.10.10.10:7860/static//windows/win.ini
; for 16-bit app support
[fonts]
[extensions]
[mci extensions]
[files]
[Mail]
MAPI=1
```

### Impact
Arbitrary file read in the context of the Windows user running Gradio.
nvd CVSS3.1 7.5
Vulnerability type
CWE-36
CWE-22 Path Traversal
Published: 1 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026