AVID-2026-R1001
Description
Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging (CVE-2022-24770)
Details
gradio is an open source framework for building interactive machine learning models and demos. Prior to version 2.8.11, gradio suffers from Improper Neutralization of Formula Elements in a CSV File. The gradio library has a flagging functionality which saves input/output data into a CSV file on the developer’s computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user’s computer. The problem has been patched as of 2.8.11, which escapes the saved csv with single quotes. As a workaround, avoid opening csv files generated by gradio with Excel or similar spreadsheet programs.
Reason for inclusion in AVID: CVE-2022-24770 describes a security vulnerability in the Gradio AI tooling library where saved CSV outputs can be manipulated to trigger Excel formula execution, potentially leading to arbitrary command execution. Gradio is used in AI model demos and pipelines; the issue involves a software dependency used to build/run AI systems, and it is clearly a security flaw with CVE coverage and a public fix. This aligns with AI-related software supply chain vulnerabilities.
References
- NVD entry
- https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c
- https://github.com/gradio-app/gradio/pull/817
- https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239
Affected or Relevant Artifacts
- Developer: gradio-app
- Deployer: gradio-app
- Artifact Details:
| Type | Name |
|---|---|
| System | gradio |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Base Score | 8.8 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-1236 | CWE-1236: Improper Neutralization of Formula Elements in a CSV File |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-03-17
- Version: 0.3.3
- AVID Entry