CVE-2024-12217:
Gradio Path Traversal vulnerability
5.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.18185%
CWE
Published
3/20/2025
Updated
3/21/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
gradio | pip |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path equivalence handling (CWE-41) in path validation logic. The GitHub advisory specifically references lines 1061-1074 in gradio/utils.py
as the vulnerable code section. These lines correspond to the path validation implementation that checks blocked paths but doesn't strip ADS syntax before validation. The function likely uses basic path resolution that preserves ADS markers, allowing bypass of restrictions through path equivalence attacks using Windows NTFS features.