CVE-2025-47783: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HumanSignal label-studio
Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-47783 is a high-severity Cross-Site Scripting (XSS) vulnerability identified in HumanSignal's Label Studio, a multi-type data labeling and annotation tool widely used for machine learning and data processing workflows. The vulnerability affects all versions prior to 1.18.0 and stems from improper neutralization of input during web page generation (CWE-79). Specifically, an attacker can exploit this flaw by sending a specially crafted POST request to the /projects/upload-example/ endpoint. The vulnerable code resides in the label_studio/projects/views.py file, where user-supplied input is not adequately sanitized before being embedded into the web page context. This allows malicious scripts to be injected and executed in the victim's browser. Successful exploitation can lead to theft of sensitive data, session hijacking, unauthorized actions performed on behalf of the user, and potentially further compromise of the affected system or network. The vulnerability requires user interaction (UI:P) but does not require authentication (PR:N), and it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact on confidentiality and integrity is high, while availability is not affected. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a tool often used in data-sensitive environments makes it a significant risk. Version 1.18.0 of Label Studio includes a patch that properly sanitizes inputs to prevent script injection, mitigating this issue.
Potential Impact
For European organizations, the impact of CVE-2025-47783 can be substantial, especially for those relying on Label Studio for data annotation in AI, research, or business intelligence projects. Exploitation could lead to unauthorized access to sensitive datasets, leakage of proprietary or personal data, and compromise of user sessions, which may facilitate further lateral movement within corporate networks. This is particularly critical under the GDPR framework, where data breaches involving personal data can result in severe regulatory penalties and reputational damage. Additionally, attackers could leverage the vulnerability to perform unauthorized actions, potentially corrupting data labeling workflows or injecting malicious data, thereby undermining the integrity of machine learning models and analytics. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks if the vulnerability is not promptly addressed. Organizations with web-facing instances of Label Studio are especially at risk, as attackers can exploit the vulnerability without prior access or credentials.
Mitigation Recommendations
European organizations should immediately upgrade all instances of Label Studio to version 1.18.0 or later, where the vulnerability is patched. In environments where immediate upgrading is not feasible, organizations should implement strict input validation and output encoding at the application layer as a temporary mitigation. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests to the /projects/upload-example/ endpoint can reduce exposure. Additionally, organizations should enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regular security audits and penetration testing focused on web application inputs should be conducted to detect similar vulnerabilities. Monitoring logs for unusual POST requests and anomalous user activity can help in early detection of exploitation attempts. Finally, educating developers and administrators about secure coding practices and the importance of timely patching is essential to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-47783: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HumanSignal label-studio
Description
Label Studio is a multi-type data labeling and annotation tool. A vulnerability in versions prior to 1.18.0 allows an attacker to inject a malicious script into the context of a web page, which can lead to data theft, session hijacking, unauthorized actions on behalf of the user, and other attacks. The vulnerability is reproducible when sending a properly formatted request to the `POST /projects/upload-example/` endpoint. In the source code, the vulnerability is located at `label_studio/projects/views.py`. Version 1.18.0 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-47783 is a high-severity Cross-Site Scripting (XSS) vulnerability identified in HumanSignal's Label Studio, a multi-type data labeling and annotation tool widely used for machine learning and data processing workflows. The vulnerability affects all versions prior to 1.18.0 and stems from improper neutralization of input during web page generation (CWE-79). Specifically, an attacker can exploit this flaw by sending a specially crafted POST request to the /projects/upload-example/ endpoint. The vulnerable code resides in the label_studio/projects/views.py file, where user-supplied input is not adequately sanitized before being embedded into the web page context. This allows malicious scripts to be injected and executed in the victim's browser. Successful exploitation can lead to theft of sensitive data, session hijacking, unauthorized actions performed on behalf of the user, and potentially further compromise of the affected system or network. The vulnerability requires user interaction (UI:P) but does not require authentication (PR:N), and it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact on confidentiality and integrity is high, while availability is not affected. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a tool often used in data-sensitive environments makes it a significant risk. Version 1.18.0 of Label Studio includes a patch that properly sanitizes inputs to prevent script injection, mitigating this issue.
Potential Impact
For European organizations, the impact of CVE-2025-47783 can be substantial, especially for those relying on Label Studio for data annotation in AI, research, or business intelligence projects. Exploitation could lead to unauthorized access to sensitive datasets, leakage of proprietary or personal data, and compromise of user sessions, which may facilitate further lateral movement within corporate networks. This is particularly critical under the GDPR framework, where data breaches involving personal data can result in severe regulatory penalties and reputational damage. Additionally, attackers could leverage the vulnerability to perform unauthorized actions, potentially corrupting data labeling workflows or injecting malicious data, thereby undermining the integrity of machine learning models and analytics. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks if the vulnerability is not promptly addressed. Organizations with web-facing instances of Label Studio are especially at risk, as attackers can exploit the vulnerability without prior access or credentials.
Mitigation Recommendations
European organizations should immediately upgrade all instances of Label Studio to version 1.18.0 or later, where the vulnerability is patched. In environments where immediate upgrading is not feasible, organizations should implement strict input validation and output encoding at the application layer as a temporary mitigation. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests to the /projects/upload-example/ endpoint can reduce exposure. Additionally, organizations should enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regular security audits and penetration testing focused on web application inputs should be conducted to detect similar vulnerabilities. Monitoring logs for unusual POST requests and anomalous user activity can help in early detection of exploitation attempts. Finally, educating developers and administrators about secure coding practices and the importance of timely patching is essential to prevent recurrence.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-09T19:49:35.621Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec562
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 9:40:54 AM
Last updated: 11/22/2025, 5:54:53 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.