Home » Database

AVID-2026-R1372

Description

Regular Expression Denial of Service (ReDoS) in gradio-app/gradio (CVE-2024-10624)

Details

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression ^(?:\s*now\s*(?:-\s*(\d+)\s*([dmhs]))?)?\s*$ to process user input. In Python’s default regex engine, this regular expression can take polynomial time to match certain crafted inputs. An attacker can exploit this by sending a crafted HTTP request, causing the gradio process to consume 100% CPU and potentially leading to a Denial of Service (DoS) condition on the server.

Reason for inclusion in AVID: CVE-2024-10624 describes a Regular Expression Denial of Service (ReDoS) vulnerability in the gradio-app/gradio repository, specifically in the gr.Datetime component. Gradio is a key library used in building and deploying AI applications and dashboards, meaning this vulnerability affects software commonly used in AI pipelines and serving stacks. It targets a software supply chain component (the Gradio library) that is part of the AI software stack, can be exploited via crafted HTTP requests to cause DoS, and has a documented CVSS score and CWE. Therefore, it satisfies the criteria for AI/GPAI-related supply chain vulnerability with explicit evidence.

References

Affected or Relevant Artifacts

  • Developer: gradio-app
  • Deployer: gradio-app
  • Artifact Details:
TypeName
Systemgradio-app/gradio

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score7.5
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity ImpactNONE
Availability Impact🔴 High

CWE

IDDescription
CWE-1333CWE-1333 Inefficient Regular Expression Complexity

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry