Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gradio-app
Gradio-app gradio |
|
| Vendors & Products |
Gradio-app
Gradio-app gradio |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a Server-Side Request Forgery (SSRF) vulnerability in Gradio allows an attacker to make arbitrary HTTP requests from a victim's server by hosting a malicious Gradio Space. When a victim application uses `gr.load()` to load an attacker-controlled Space, the malicious `proxy_url` from the config is trusted and added to the allowlist, enabling the attacker to access internal services, cloud metadata endpoints, and private networks through the victim's infrastructure. Version 6.6.0 fixes the issue. | |
| Title | Gradio has SSRF via Malicious `proxy_url` Injection in `gr.load()` Config Processing | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-27T21:47:04.975Z
Updated: 2026-03-02T21:59:40.942Z
Reserved: 2026-02-27T15:33:57.289Z
Link: CVE-2026-28416
Updated: 2026-03-02T21:59:37.308Z
Status : Awaiting Analysis
Published: 2026-02-27T22:16:24.667
Modified: 2026-03-02T20:30:10.923
Link: CVE-2026-28416