Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| gradio-app | gradio | < 6.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Gradio < 6.7 on Windows with Python 3.13+ contains an absolute path traversal caused by incorrect path validation in path joining logic, letting unauthenticated attackers read arbitrary files from the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-28414.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-28416 | 8.2 HIGH | Gradio has SSRF via Malicious `proxy_url` Injection in `gr.load()` Config Processing |
| CVE-2026-28415 | 4.3 MEDIUM | Gradio has Open Redirect in OAuth Flow |
| CVE-2026-27167 | Gradio: Mocked OAuth Login Exposes Server Credentials and Uses Hardcoded Session Secret |
No comments yet