Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 15 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue. | |
Title | label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter. | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-14T23:01:17.213Z
Updated: 2025-05-15T15:32:26.174Z
Reserved: 2025-05-09T19:49:35.621Z
Link: CVE-2025-47783

Updated: 2025-05-15T15:31:55.851Z

Status : Awaiting Analysis
Published: 2025-05-14T23:15:48.213
Modified: 2025-05-16T14:43:26.160
Link: CVE-2025-47783

No data.