CVE-2026-23516
EUVD-2026-377421.01.2026, 22:15
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label; and/or get the victim user to upload a maliciously crafted SVG image when configuring a skeleton. This gives the attacker temporary access to all CVAT resources that the victim user can access. Version 2.55.0 fixes the issue.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| cvat | computer_vision_annotation_tool | 2.2.0 ≤ 𝑥 < 2.55.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-83 - Improper Neutralization of Script in Attributes in a Web PageThe software does not neutralize or incorrectly neutralizes "javascript:" or other URIs from dangerous attributes within tags, such as onmouseover, onload, onerror, or style.
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.