CVE-2026-27167

Gradio is an open-source Python package designed for quick prototyping. Starting in version 4.16.0 and prior to version 6.6.0, Gradio applications running outside of Hugging Face Spaces automatically enable "mocked" OAuth routes when OAuth components (e.g. `gr.LoginButton`) are used. When a user visits `/login/huggingface`, the server retrieves its own Hugging Face access token via `huggingface_hub.get_token()` and stores it in the visitor's session cookie. If the application is network-accessible, any remote attacker can trigger this flow to steal the server owner's HF token. The session cookie is signed with a hardcoded secret derived from the string `"-v4"`, making the payload trivially decodable. Version 6.6.0 fixes the issue.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

No history.

Information

Published : 2026-02-27 22:16

Updated : 2026-03-05 13:13


NVD link : CVE-2026-27167

Mitre link : CVE-2026-27167

CVE.ORG link : CVE-2026-27167


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-522

Insufficiently Protected Credentials

CWE-798

Use of Hard-coded Credentials