Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. gradio
  4. ›
  5. CVE-2026-28415

CVE-2026-28415: Gradio has an Open Redirect in its OAuth Flow

March 1, 2026

The _redirect_to_target() function in Gradio’s OAuth flow accepts an unvalidated _target_url query parameter, allowing redirection to arbitrary external URLs. This affects the /logout and /login/callback endpoints on Gradio apps with OAuth enabled (i.e. apps running on Hugging Face Spaces with gr.LoginButton).

References

  • github.com/advisories/GHSA-pfjf-5gxr-995x
  • github.com/gradio-app/gradio
  • github.com/gradio-app/gradio/commit/dfee0da06d0aa94b3c2684131e7898d5d5c1911e
  • github.com/gradio-app/gradio/releases/tag/gradio%406.6.0
  • github.com/gradio-app/gradio/security/advisories/GHSA-pfjf-5gxr-995x
  • nvd.nist.gov/vuln/detail/CVE-2026-28415

Code Behaviors & Features

Detect and mitigate CVE-2026-28415 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.6.0

Fixed versions

  • 6.6.0

Solution

Upgrade to version 6.6.0 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-284: Improper Access Control
  • CWE-330: Use of Insufficiently Random Values
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

pypi/gradio/CVE-2026-28415.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:25 +0000.