A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Jul 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gradio Project
Gradio Project gradio |
|
CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
Vendors & Products |
Gradio Project
Gradio Project gradio |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-03-29T04:35:12.067Z
Updated: 2024-08-01T18:48:21.924Z
Reserved: 2024-02-21T21:57:22.217Z
Link: CVE-2024-1729

Updated: 2024-08-01T18:48:21.924Z

Status : Analyzed
Published: 2024-03-29T05:15:45.477
Modified: 2025-07-30T12:43:07.253
Link: CVE-2024-1729

No data.