Skip to main content

CVE-2025-48381: CWE-201: Insertion of Sensitive Information Into Sent Data in cvat-ai cvat

Medium
VulnerabilityCVE-2025-48381cvecve-2025-48381cwe-201
Published: Fri May 30 2025 (05/30/2025, 03:38:24 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. In versions starting from 2.4.0 to before 2.38.0, an authenticated CVAT user may be able to retrieve the IDs and names of all tasks, projects, labels, and the IDs of all jobs and quality reports on the CVAT instance. In addition, if the instance contains many resources of a particular type, retrieving this information may tie up system resources, denying access to legitimate users. This issue has been patched in version 2.38.0.

AI-Powered Analysis

AILast updated: 07/07/2025, 21:40:04 UTC

Technical Analysis

CVE-2025-48381 is a medium severity vulnerability identified in the Computer Vision Annotation Tool (CVAT), an open-source interactive video and image annotation platform widely used in computer vision projects. The vulnerability affects CVAT versions from 2.4.0 up to but not including 2.38.0. It allows an authenticated user with legitimate access to the CVAT instance to retrieve sensitive metadata information, including the IDs and names of all tasks, projects, labels, as well as the IDs of all jobs and quality reports. This exposure of sensitive information corresponds to CWE-201: Insertion of Sensitive Information Into Sent Data. Although the attacker must already be authenticated, the vulnerability does not require elevated privileges or user interaction beyond authentication. Furthermore, if the CVAT instance contains a large volume of resources of a particular type, exploiting this vulnerability can cause excessive consumption of system resources, potentially leading to denial of service (DoS) conditions that prevent legitimate users from accessing the service. The vulnerability has been addressed and patched in CVAT version 2.38.0. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required beyond authentication, no user interaction, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild.

Potential Impact

For European organizations using CVAT for computer vision annotation tasks, this vulnerability poses a risk primarily related to information disclosure and potential service disruption. The exposure of task, project, label, job, and quality report identifiers and names could aid an attacker in reconnaissance activities, enabling them to map out the structure and scope of ongoing projects. This could facilitate further targeted attacks or unauthorized data access if combined with other vulnerabilities or insider threats. The potential for resource exhaustion leading to denial of service could disrupt critical annotation workflows, delaying development and deployment of AI models, which may impact sectors relying on timely computer vision data processing such as automotive, healthcare, manufacturing, and security. Although the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit it. The impact on confidentiality is limited to metadata exposure rather than direct access to annotated data or raw images, but the operational disruption risk elevates the overall concern. Given the growing adoption of AI and computer vision technologies in Europe, especially in research institutions and enterprises, this vulnerability could affect organizations relying on CVAT for annotation pipelines.

Mitigation Recommendations

European organizations should promptly upgrade all CVAT instances to version 2.38.0 or later, where this vulnerability is patched. Until the upgrade is applied, organizations should enforce strict access controls and monitor authenticated user activities to detect unusual enumeration or resource-intensive requests. Implementing rate limiting on API endpoints that expose task, project, label, job, and quality report metadata can help mitigate resource exhaustion risks. Additionally, organizations should ensure strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. Regular audits of user permissions and session logs can help identify potential insider threats or misuse. Network segmentation and isolation of CVAT instances from broader enterprise networks can limit the impact of any exploitation. Finally, organizations should maintain up-to-date backups and incident response plans to quickly recover from potential denial of service or other disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-19T15:46:00.396Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68392cfa182aa0cae29ce4a4

Added to database: 5/30/2025, 3:58:50 AM

Last enriched: 7/7/2025, 9:40:04 PM

Last updated: 7/31/2025, 7:05:17 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats