Description
Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
Published: 2025-05-14
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14944 label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter.
Github GHSA Github GHSA GHSA-8jhr-wpcm-hh4h label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter.
History

Fri, 22 Aug 2025 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Thu, 15 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 May 2025 23:15:00 +0000

Type Values Removed Values Added
Description Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
Title label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter.
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Humansignal Label Studio
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-05-15T15:32:26.174Z

Reserved: 2025-05-09T19:49:35.621Z

Link: CVE-2025-47783

cve-icon Vulnrichment

Updated: 2025-05-15T15:31:55.851Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-14T23:15:48.213

Modified: 2025-08-22T20:24:03.367

Link: CVE-2025-47783

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-06-24T09:44:18Z

Weaknesses