-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| gradio | pip | <= 4.36.1 |
The vulnerability stems from improper validation of URLs during redirects. Open redirects typically occur in functions that handle URL parameters for redirection. In Gradio's architecture, route handlers (e.g., in routes.py) are the most plausible location for this flaw. While the exact function isn't specified in the provided data, the pattern of open redirect vulnerabilities strongly suggests a route handler that accepts a URL parameter and redirects without sanitization. Confidence is medium due to the lack of explicit code examples or patch details, but the description aligns with common open redirect patterns.