Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14944 | label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter. |
Github GHSA |
GHSA-8jhr-wpcm-hh4h | label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter. |
Fri, 22 Aug 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 15 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 May 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue. | |
| Title | label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter. | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-15T15:32:26.174Z
Reserved: 2025-05-09T19:49:35.621Z
Link: CVE-2025-47783
Updated: 2025-05-15T15:31:55.851Z
Status : Analyzed
Published: 2025-05-14T23:15:48.213
Modified: 2025-08-22T20:24:03.367
Link: CVE-2025-47783
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:18Z
EUVD
Github GHSA