CVE-2025-23042
Published: 14 January 2025
Summary
CVE-2025-23042 is a high-severity Improper Authorization (CWE-285) vulnerability in Gradio Project Gradio. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 27.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as APIs and Models; in the Privacy and Disclosure risk domain.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the lack of case normalization in Gradio's file path validation logic, preventing bypass of ACL restrictions via case-altered paths on case-insensitive file systems.
Enforces proper access authorizations for file resources, mitigating unauthorized access to sensitive files due to flawed path-based ACL enforcement in Gradio.
Requires timely identification, reporting, and correction of flaws like the case normalization defect in Gradio, with testing to ensure remediation effectiveness via upgrade to version 5.6.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-23042 enables bypassing Gradio's file ACL via case manipulation on case-insensitive FS, facilitating exploitation of public-facing web apps (T1190) for unauthorized local file access (T1005) and credential theft from files (T1552.001).
NVD Description
Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter…
more
case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. This issue has been addressed in release version 5.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Deeper analysisAI
CVE-2025-23042 is a vulnerability in Gradio, an open-source Python package used for quickly building demos and web applications for machine learning models, APIs, or arbitrary Python functions. The flaw allows bypassing of Gradio's Access Control List (ACL) for file paths by altering the letter case of a blocked file or directory path. This occurs due to a lack of case normalization in the file path validation logic, enabling access to sensitive files on case-insensitive file systems such as those on Windows and macOS.
Unauthenticated attackers with network access can exploit this vulnerability with low attack complexity and no user interaction, as reflected in its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Exploitation grants unauthorized access to protected files, leading to exposure of sensitive information and compromising the confidentiality of data served by Gradio applications.
The Gradio security advisory (GHSA-j2jg-fq62-7c3h) states that the issue has been fixed in release version 5.6.0, and users are advised to upgrade immediately. No workarounds are available.
Gradio's widespread use in machine learning and AI web applications heightens the risk of this vulnerability in production environments, where it is classified under CWE-285 (Improper Authorization). No real-world exploitation has been reported.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- APIs and Models
- Risk Domain
- Privacy and Disclosure
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Gradio is an open-source platform for building web demos and applications specifically for machine learning models and AI, making it AI-related under 'Other Platforms'. The vulnerability affects its file path ACL in demo deployments.