{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T17:20:07.920","vulnerabilities":[{"cve":{"id":"CVE-2026-28414","sourceIdentifier":"security-advisories@github.com","published":"2026-02-27T22:16:24.330","lastModified":"2026-03-05T13:09:59.390","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue."},{"lang":"es","value":"Gradio es un paquete Python de código abierto diseñado para la creación rápida de prototipos. Antes de la versión 6.7, las aplicaciones Gradio que se ejecutaban en Windows con Python 3.13+ eran vulnerables a un problema de recorrido de rutas absolutas que permitía a atacantes no autenticados leer archivos arbitrarios del sistema de archivos. Python 3.13+ cambió la definición de `os.path.isabs` para que las rutas relativas a la raíz, como `/windows/win . ini` en Windows, ya no se consideren rutas absolutas, lo que da lugar a una vulnerabilidad en la lógica de Gradio para unir rutas de forma segura. Esto puede ser explotado por atacantes no autenticados para leer archivos arbitrarios del servidor Gradio, incluso cuando Gradio está configurado con autenticación. La versión 6.7 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-36"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*","versionEndExcluding":"6.7.0","matchCriteriaId":"DADC4436-1106-471B-879B-D308AFC6D64D"}]}]}],"references":[{"url":"https://github.com/gradio-app/gradio/security/advisories/GHSA-39mp-8hj3-5c49","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}