CVE-2025-5173: Deserialization in HumanSignal label-studio-ml-backend
A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization. An attack has to be approached locally. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
AI Analysis
Technical Summary
CVE-2025-5173 is a medium-severity deserialization vulnerability identified in the HumanSignal label-studio-ml-backend, specifically affecting the function 'load' within the file 'label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py'. The vulnerability arises from improper handling of the 'path' argument, which leads to unsafe deserialization. Deserialization vulnerabilities occur when untrusted input is deserialized without sufficient validation, potentially allowing an attacker to execute arbitrary code or manipulate program state. In this case, the vulnerability requires local access with low privileges (PR:L) and no user interaction (UI:N), meaning an attacker must have some level of local access to exploit it. The attack vector is local (AV:L), and the vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The product uses a rolling release model, so specific fixed versions are not clearly defined. No known exploits are currently reported in the wild. The CVSS 4.0 base score is 4.8, reflecting a medium severity. The vulnerability does not require authentication (AT:N) but does require local privileges, limiting remote exploitation potential. The affected component is part of the PT File Handler, which likely processes files related to machine learning models or data. Exploitation could lead to code execution or data manipulation on the host running the label-studio-ml-backend service, potentially compromising the integrity and confidentiality of machine learning workflows or data processed by the system.
Potential Impact
For European organizations using HumanSignal's label-studio-ml-backend, especially those involved in machine learning, data annotation, or AI model deployment, this vulnerability poses a risk of local privilege escalation or unauthorized code execution. While remote exploitation is not feasible, insider threats or compromised local accounts could leverage this vulnerability to manipulate machine learning models or data, potentially undermining data integrity and confidentiality. This could affect sectors relying on AI workflows such as automotive, healthcare, finance, and research institutions. Additionally, any disruption or manipulation of ML pipelines could impact decision-making processes or automated systems, leading to operational disruptions. Given the increasing adoption of AI and ML tools in Europe, the vulnerability could have a moderate impact on organizations that do not enforce strict local access controls or do not apply timely updates. However, the requirement for local access reduces the likelihood of widespread exploitation, limiting the scope primarily to environments where multiple users have local system access or where attackers have already gained some foothold.
Mitigation Recommendations
European organizations should implement strict local access controls and limit user privileges on systems running label-studio-ml-backend to trusted personnel only. Employing application whitelisting and monitoring for unusual local activity can help detect exploitation attempts. Since the product uses rolling releases, organizations should subscribe to HumanSignal's update channels and apply patches or updates promptly once available. Additionally, sandboxing the label-studio-ml-backend process or running it within containerized environments can reduce the impact of potential exploitation. Organizations should also audit and restrict file system permissions to prevent unauthorized manipulation of files passed to the vulnerable 'load' function. Implementing host-based intrusion detection systems (HIDS) to monitor deserialization-related anomalies and conducting regular security assessments of ML infrastructure will further reduce risk. Finally, educating local users about the risks of executing untrusted code or files can help prevent accidental exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-5173: Deserialization in HumanSignal label-studio-ml-backend
Description
A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization. An attack has to be approached locally. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
AI-Powered Analysis
Technical Analysis
CVE-2025-5173 is a medium-severity deserialization vulnerability identified in the HumanSignal label-studio-ml-backend, specifically affecting the function 'load' within the file 'label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py'. The vulnerability arises from improper handling of the 'path' argument, which leads to unsafe deserialization. Deserialization vulnerabilities occur when untrusted input is deserialized without sufficient validation, potentially allowing an attacker to execute arbitrary code or manipulate program state. In this case, the vulnerability requires local access with low privileges (PR:L) and no user interaction (UI:N), meaning an attacker must have some level of local access to exploit it. The attack vector is local (AV:L), and the vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The product uses a rolling release model, so specific fixed versions are not clearly defined. No known exploits are currently reported in the wild. The CVSS 4.0 base score is 4.8, reflecting a medium severity. The vulnerability does not require authentication (AT:N) but does require local privileges, limiting remote exploitation potential. The affected component is part of the PT File Handler, which likely processes files related to machine learning models or data. Exploitation could lead to code execution or data manipulation on the host running the label-studio-ml-backend service, potentially compromising the integrity and confidentiality of machine learning workflows or data processed by the system.
Potential Impact
For European organizations using HumanSignal's label-studio-ml-backend, especially those involved in machine learning, data annotation, or AI model deployment, this vulnerability poses a risk of local privilege escalation or unauthorized code execution. While remote exploitation is not feasible, insider threats or compromised local accounts could leverage this vulnerability to manipulate machine learning models or data, potentially undermining data integrity and confidentiality. This could affect sectors relying on AI workflows such as automotive, healthcare, finance, and research institutions. Additionally, any disruption or manipulation of ML pipelines could impact decision-making processes or automated systems, leading to operational disruptions. Given the increasing adoption of AI and ML tools in Europe, the vulnerability could have a moderate impact on organizations that do not enforce strict local access controls or do not apply timely updates. However, the requirement for local access reduces the likelihood of widespread exploitation, limiting the scope primarily to environments where multiple users have local system access or where attackers have already gained some foothold.
Mitigation Recommendations
European organizations should implement strict local access controls and limit user privileges on systems running label-studio-ml-backend to trusted personnel only. Employing application whitelisting and monitoring for unusual local activity can help detect exploitation attempts. Since the product uses rolling releases, organizations should subscribe to HumanSignal's update channels and apply patches or updates promptly once available. Additionally, sandboxing the label-studio-ml-backend process or running it within containerized environments can reduce the impact of potential exploitation. Organizations should also audit and restrict file system permissions to prevent unauthorized manipulation of files passed to the vulnerable 'load' function. Implementing host-based intrusion detection systems (HIDS) to monitor deserialization-related anomalies and conducting regular security assessments of ML infrastructure will further reduce risk. Finally, educating local users about the risks of executing untrusted code or files can help prevent accidental exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-25T13:35:14.724Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68340f960acd01a24928410e
Added to database: 5/26/2025, 6:52:06 AM
Last enriched: 7/9/2025, 1:42:57 PM
Last updated: 8/18/2025, 11:33:56 PM
Views: 18
Related Threats
CVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighCVE-2025-52450: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server
HighCVE-2025-26498: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
CriticalCVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.