
Cloud Vulnerability DB
A community-led vulnerabilities database
Command Injection vulnerability (CVE-2023-6572) was discovered in GitHub repository gradio-app/gradio prior to main branch. The vulnerability affects the Gradio Python package versions up to (excluding) 4.14.0 and versions up to (excluding) 2023-11-06 (NVD).
The vulnerability is classified as a Command Injection (CWE-77) issue. It received a CVSS v3.1 base score of 8.1 (HIGH) from NVD with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N, while huntr.dev assigned a CVSS v3.0 score of 9.6 (CRITICAL) with vector string CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N (NVD).
The Command Injection vulnerability could allow an attacker with low privileges to achieve high levels of confidentiality and integrity impact. The attack vector is network-accessible and requires low attack complexity with no user interaction (NVD).
A patch has been released to address this vulnerability. Users should upgrade to Gradio version 4.14.0 or later, or use versions after 2023-11-06. The fix was implemented in commit 5b5af1899dd98d63e1f9b48a93601c2db1f56520 (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."