Vulnerability Description
Command Injection in GitHub repository gradio-app/gradio prior to main.
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gradio Project | Gradio | < 4.14.0 |
Related Weaknesses (CWE)
References
- https://github.com/gradio-app/gradio/commit/5b5af1899dd98d63e1f9b48a93601c2db1f5Patch
- https://huntr.com/bounties/21d2ff0c-d43a-4afd-bb4d-049ee8da5b5cExploitIssue TrackingPatch
- https://github.com/gradio-app/gradio/commit/5b5af1899dd98d63e1f9b48a93601c2db1f5Patch
- https://huntr.com/bounties/21d2ff0c-d43a-4afd-bb4d-049ee8da5b5cExploitIssue TrackingPatch
FAQ
What is CVE-2023-6572?
CVE-2023-6572 is a vulnerability with a CVSS score of 8.1 (HIGH). Command Injection in GitHub repository gradio-app/gradio prior to main.
How severe is CVE-2023-6572?
CVE-2023-6572 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6572?
Check the references section above for vendor advisories and patch information. Affected products include: Gradio Project Gradio.