CVE-2025-47783

Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*

History

22 Aug 2025, 20:24

Type Values Removed Values Added
CPE cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*
First Time Humansignal label Studio
Humansignal
References () https://github.com/HumanSignal/label-studio/security/advisories/GHSA-8jhr-wpcm-hh4h - () https://github.com/HumanSignal/label-studio/security/advisories/GHSA-8jhr-wpcm-hh4h - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

16 May 2025, 14:43

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-14 23:15

Updated : 2025-08-22 20:24


NVD link : CVE-2025-47783

Mitre link : CVE-2025-47783

CVE.ORG link : CVE-2025-47783


JSON object : View

Products Affected

humansignal

  • label_studio
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')