If you’re learning about cybersecurity or experimenting with AI tools, you’ve probably heard of Gradio — the popular Python library that makes it super easy to create web interfaces for machine learning models. Unfortunately, a serious security flaw was just discovered that every aspiring hacker and developer should understand.
What Happened?
Security researchers discovered CVE-2026-28415, a vulnerability in Gradio versions before 6.6.0. The flaw exists in the OAuth (authentication) flow — specifically in how Gradio handles redirect URLs after login.
The Technical Issue (Simplified)
When you log into a Gradio app using OAuth (like “Sign in with Google”), the app needs to redirect you somewhere after authentication. Gradio had a function called _redirect_to_target() that accepted a URL parameter… but didn’t check if that URL was safe.
This means an attacker could craft a malicious link like:
https://your-gradio-app.com/login/callback?_target_url=https://evil-phishing-site.com
When you click that link and log in, instead of going back to the legitimate app, you’d be sent to the attacker’s phishing page — potentially giving away your credentials.
Why This Matters for Beginners
This vulnerability teaches several important cybersecurity concepts:
1. Open Redirect Vulnerabilities
An “open redirect” happens when an application redirects users to a URL provided in the request without validating it. They’re dangerous because:
- Users trust the original domain
- The malicious redirect happens after legitimate authentication
- Phishing attacks become much more convincing
2. Input Validation is Everything
The fix was simple: validate that the _target_url parameter points to an allowed domain. This is a fundamental security principle — never trust user input.
3. OAuth Flows Have Many Attack Surfaces
OAuth is complex, with multiple steps where things can go wrong:
- Authorization request
- Callback handling (where this bug lived)
- Token exchange
- User session creation
Each step needs careful security review.
How to Protect Yourself
If You’re Running Gradio Apps
-
Update immediately to Gradio 6.6.0 or later:
pip install --upgrade gradio -
Check your current version:
import gradio print(gradio.__version__)
If You’re a User
- Be suspicious of links that include redirect parameters
- Check the URL bar after logging in
- When in doubt, navigate directly to the app instead of clicking links
If You’re Learning Security
This is a great vulnerability to study because:
- It’s easy to understand
- The fix is straightforward
- It demonstrates real-world impact
- Similar bugs exist in many applications
Practice: Finding Open Redirects
Want to learn to find these yourself? Here’s how researchers test for open redirects:
- Look for URL parameters like
redirect,url,next,return,target - Try changing them to external domains
- Check if the application validates the destination
- Document your findings responsibly
Remember: Only test on applications you have permission to test, or use bug bounty programs!
Key Takeaways
- CVE-2026-28415 is a critical open redirect in Gradio’s OAuth flow
- Upgrade to 6.6.0+ if you’re running Gradio applications
- Input validation prevents most redirect vulnerabilities
- OAuth implementations are common attack targets — study them!
This vulnerability is a reminder that even popular, well-maintained libraries can have security flaws. As a security learner, understanding how these bugs work makes you better at both finding and preventing them.
Stay curious, stay safe, and keep learning! 🎯



