CVE-2026-2108: Denial of Service in jsbroks COCO Annotator
CVE-2026-2108 is a denial of service (DoS) vulnerability affecting jsbroks COCO Annotator versions up to 0. 11. 1. The flaw exists in the /api/info/long_task endpoint, allowing an unauthenticated remote attacker to cause service disruption. The vulnerability has a CVSS 4. 0 score of 6. 9 (medium severity) and does not require user interaction or privileges. Although the vendor was notified, no patch or response has been issued, and public exploit details are available. This could lead to temporary unavailability of annotation services, impacting workflows that rely on COCO Annotator. European organizations using this tool for machine learning or computer vision projects may experience operational interruptions.
AI Analysis
Technical Summary
CVE-2026-2108 is a denial of service vulnerability identified in jsbroks COCO Annotator, an open-source tool used for annotating images in computer vision projects. The vulnerability resides in an unspecified function within the /api/info/long_task endpoint of the application. This endpoint, when manipulated remotely without authentication, can be exploited to cause the application to become unresponsive or crash, resulting in denial of service. The vulnerability affects versions 0.11.0 and 0.11.1 of COCO Annotator. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability protections (VC:N, VI:N, VA:L). The exploit is publicly disclosed, increasing the risk of exploitation, though no known active exploitation in the wild has been reported. The vendor was contacted but has not provided a patch or mitigation guidance. This leaves users exposed to potential service disruptions, which can impact workflows dependent on the availability of annotation services for machine learning data preparation.
Potential Impact
For European organizations, especially those involved in AI, machine learning, and computer vision research or product development, this vulnerability can disrupt critical annotation workflows. Denial of service on the COCO Annotator platform can delay data labeling processes, impacting project timelines and productivity. Organizations relying on this tool for training data preparation may face operational downtime, potentially affecting downstream model accuracy and deployment schedules. The lack of vendor response and patch availability increases risk exposure. Additionally, service unavailability could impact collaborative projects or cloud-based annotation services hosted in Europe, leading to broader operational impacts. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can have significant business consequences in time-sensitive environments.
Mitigation Recommendations
Until an official patch is released, European organizations should implement network-level access controls to restrict access to the /api/info/long_task endpoint, limiting it to trusted internal IP addresses or VPN users. Deploy rate limiting and anomaly detection on this endpoint to prevent abuse and detect potential exploitation attempts early. Consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting this endpoint. Regularly monitor application logs for unusual activity patterns indicative of DoS attempts. If feasible, isolate the COCO Annotator service in a segmented network zone to contain potential disruptions. Engage with the open-source community or maintainers for any unofficial patches or workarounds. Finally, prepare incident response plans to quickly restore service availability in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2026-2108: Denial of Service in jsbroks COCO Annotator
Description
CVE-2026-2108 is a denial of service (DoS) vulnerability affecting jsbroks COCO Annotator versions up to 0. 11. 1. The flaw exists in the /api/info/long_task endpoint, allowing an unauthenticated remote attacker to cause service disruption. The vulnerability has a CVSS 4. 0 score of 6. 9 (medium severity) and does not require user interaction or privileges. Although the vendor was notified, no patch or response has been issued, and public exploit details are available. This could lead to temporary unavailability of annotation services, impacting workflows that rely on COCO Annotator. European organizations using this tool for machine learning or computer vision projects may experience operational interruptions.
AI-Powered Analysis
Technical Analysis
CVE-2026-2108 is a denial of service vulnerability identified in jsbroks COCO Annotator, an open-source tool used for annotating images in computer vision projects. The vulnerability resides in an unspecified function within the /api/info/long_task endpoint of the application. This endpoint, when manipulated remotely without authentication, can be exploited to cause the application to become unresponsive or crash, resulting in denial of service. The vulnerability affects versions 0.11.0 and 0.11.1 of COCO Annotator. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability protections (VC:N, VI:N, VA:L). The exploit is publicly disclosed, increasing the risk of exploitation, though no known active exploitation in the wild has been reported. The vendor was contacted but has not provided a patch or mitigation guidance. This leaves users exposed to potential service disruptions, which can impact workflows dependent on the availability of annotation services for machine learning data preparation.
Potential Impact
For European organizations, especially those involved in AI, machine learning, and computer vision research or product development, this vulnerability can disrupt critical annotation workflows. Denial of service on the COCO Annotator platform can delay data labeling processes, impacting project timelines and productivity. Organizations relying on this tool for training data preparation may face operational downtime, potentially affecting downstream model accuracy and deployment schedules. The lack of vendor response and patch availability increases risk exposure. Additionally, service unavailability could impact collaborative projects or cloud-based annotation services hosted in Europe, leading to broader operational impacts. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can have significant business consequences in time-sensitive environments.
Mitigation Recommendations
Until an official patch is released, European organizations should implement network-level access controls to restrict access to the /api/info/long_task endpoint, limiting it to trusted internal IP addresses or VPN users. Deploy rate limiting and anomaly detection on this endpoint to prevent abuse and detect potential exploitation attempts early. Consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting this endpoint. Regularly monitor application logs for unusual activity patterns indicative of DoS attempts. If feasible, isolate the COCO Annotator service in a segmented network zone to contain potential disruptions. Engage with the open-source community or maintainers for any unofficial patches or workarounds. Finally, prepare incident response plans to quickly restore service availability in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T14:23:41.354Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69878f40f9fa50a62f7c5181
Added to database: 2/7/2026, 7:15:12 PM
Last enriched: 2/7/2026, 7:29:44 PM
Last updated: 2/7/2026, 9:22:34 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.