Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Aug 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Thu, 15 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue. | |
Title | label-studio vulnerable to Cross-Site Scripting (Reflected) via the label_config parameter. | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-14T23:01:17.213Z
Updated: 2025-05-15T15:32:26.174Z
Reserved: 2025-05-09T19:49:35.621Z
Link: CVE-2025-47783

Updated: 2025-05-15T15:31:55.851Z

Status : Analyzed
Published: 2025-05-14T23:15:48.213
Modified: 2025-08-22T20:24:03.367
Link: CVE-2025-47783

No data.