Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/HumanSignal/label-studio/security/advisories/GHSA-8jhr-wpcm-hh4h | Exploit Vendor Advisory |
Configurations
History
22 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:* | |
First Time |
Humansignal label Studio
Humansignal |
|
References | () https://github.com/HumanSignal/label-studio/security/advisories/GHSA-8jhr-wpcm-hh4h - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
16 May 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-14 23:15
Updated : 2025-08-22 20:24
NVD link : CVE-2025-47783
Mitre link : CVE-2025-47783
CVE.ORG link : CVE-2025-47783
JSON object : View
Products Affected
humansignal
- label_studio
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')