CVE-2024-10648: Gradio: path traversal enables arbitrary file deletion DoS

GHSA-pgfv-gvc5-prfg HIGH PoC AVAILABLE CISA: TRACK*
Published March 20, 2025
CISO Take

Any Gradio instance (versions 4.0.0–5.0.0b2) exposed to a network is vulnerable to unauthenticated file-wiping attacks via crafted audio format parameters — no credentials needed, no user interaction required. The attack resets arbitrary server files to empty, causing immediate service disruption to any AI workload served through Gradio. Audit your ML demo environments, internal AI tools, and Hugging Face Spaces deployments immediately and upgrade or isolate.

Risk Assessment

High severity in context despite low EPSS (0.00245). The CVSS 8.2 score reflects a zero-barrier attack path: network-accessible, no auth, no interaction. While not yet actively exploited at scale, Gradio is ubiquitous in AI/ML environments — model demos, internal prototyping tools, and production-adjacent inference UIs. A single successful exploit can wipe config files, weights, or application code, halting AI services. Exposure risk is elevated because Gradio instances are frequently deployed internet-facing (Hugging Face Spaces, internal demos) with minimal hardening.

Affected Systems

Package Ecosystem Vulnerable Range Patched
gradio pip No patch
42.5K OpenSSF 5.5 679 dependents Pushed 2d ago 27% patched ~110d to patch Full package profile →
gradio pip >= 4.0.0, <= 5.0.0b2 No patch
42.5K OpenSSF 5.5 679 dependents Pushed 2d ago 27% patched ~110d to patch Full package profile →

Severity & Risk

CVSS 3.1
8.2 / 10
EPSS
0.3%
chance of exploitation in 30 days
Higher than 49% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I Low
A High

Recommended Action

5 steps
  1. PATCH

    Upgrade to Gradio >5.0.0b2 immediately. No official patch version is confirmed in the advisory yet — monitor https://github.com/gradio-app/gradio/releases for the fix commit post-98cbcae.

  2. ISOLATE

    If patching is not immediately possible, restrict Gradio instances to authenticated internal networks only — remove all public exposure.

  3. WORKAROUND

    Implement a WAF rule blocking audio format parameters containing path traversal sequences (../, ..\, URL-encoded equivalents).

  4. DETECT

    Audit server logs for unusual format parameter values in audio processing requests; alert on file size drops to zero in monitored directories.

  5. HARDEN

    Run Gradio in a container with read-only filesystem mounts where possible, limiting blast radius of file deletion.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable Yes
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
A.6.2.5 - AI system security and resilience
NIST AI RMF
MANAGE 2.6 - Residual risks are monitored and managed
OWASP LLM Top 10
LLM05:2025 - Improper Output Handling / Insecure Plugin Design

Frequently Asked Questions

What is CVE-2024-10648?

Any Gradio instance (versions 4.0.0–5.0.0b2) exposed to a network is vulnerable to unauthenticated file-wiping attacks via crafted audio format parameters — no credentials needed, no user interaction required. The attack resets arbitrary server files to empty, causing immediate service disruption to any AI workload served through Gradio. Audit your ML demo environments, internal AI tools, and Hugging Face Spaces deployments immediately and upgrade or isolate.

Is CVE-2024-10648 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2024-10648, increasing the risk of exploitation.

How to fix CVE-2024-10648?

1. PATCH: Upgrade to Gradio >5.0.0b2 immediately. No official patch version is confirmed in the advisory yet — monitor https://github.com/gradio-app/gradio/releases for the fix commit post-98cbcae. 2. ISOLATE: If patching is not immediately possible, restrict Gradio instances to authenticated internal networks only — remove all public exposure. 3. WORKAROUND: Implement a WAF rule blocking audio format parameters containing path traversal sequences (../, ..\, URL-encoded equivalents). 4. DETECT: Audit server logs for unusual format parameter values in audio processing requests; alert on file size drops to zero in monitored directories. 5. HARDEN: Run Gradio in a container with read-only filesystem mounts where possible, limiting blast radius of file deletion.

What systems are affected by CVE-2024-10648?

This vulnerability affects the following AI/ML architecture patterns: model serving, AI demo platforms, ML prototyping environments, inference APIs with Gradio frontend.

What is the CVSS score for CVE-2024-10648?

CVE-2024-10648 has a CVSS v3.1 base score of 8.2 (HIGH). The EPSS exploitation probability is 0.25%.

Technical Details

NVD Description

A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server.

Exploitation Scenario

Adversary identifies a public-facing Gradio instance running a speech-to-text or audio classification model (common in enterprise AI demos). Using the Gradio Audio component's format parameter, they craft a request that manipulates the output path via CWE-29 path traversal (e.g., injecting '..filename' sequences to escape the intended temp directory). The Gradio processing_utils.py handler at line 234 resolves the attacker-controlled path and resets the target file to empty. The adversary iterates over predictable paths: application config files, model weight files (*.pt, *.onnx), or database files — systematically disabling the AI service. No authentication token, API key, or insider access required.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Timeline

Published
March 20, 2025
Last Modified
October 14, 2025
First Seen
March 20, 2025

Related Vulnerabilities