A weakness has been identified in jsbroks COCO Annotator up to 0.11.1. Affected is an unknown function of the file backend/webserver/api/datasets.py of the component Data Endpoint. Executing a manipulation of the argument folder can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
History

Mon, 04 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 03 May 2026 05:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in jsbroks COCO Annotator up to 0.11.1. Affected is an unknown function of the file backend/webserver/api/datasets.py of the component Data Endpoint. Executing a manipulation of the argument folder can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title jsbroks COCO Annotator Data Endpoint datasets.py path traversal
First Time appeared Jsbroks
Jsbroks coco Annotator
Weaknesses CWE-22
CPEs cpe:2.3:a:jsbroks:coco_annotator:*:*:*:*:*:*:*:*
Vendors & Products Jsbroks
Jsbroks coco Annotator
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2026-05-03T04:30:11.891Z

Updated: 2026-05-04T13:22:41.014Z

Reserved: 2026-05-02T08:42:48.923Z

Link: CVE-2026-7680

cve-icon Vulnrichment

Updated: 2026-05-04T13:22:36.850Z

cve-icon NVD

Status : Received

Published: 2026-05-03T06:15:57.983

Modified: 2026-05-03T06:15:57.983

Link: CVE-2026-7680

cve-icon Redhat

No data.