Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2108: Denial of Service in jsbroks COCO Annotator

0
Medium
VulnerabilityCVE-2026-2108cvecve-2026-2108
Published: Sat Feb 07 2026 (02/07/2026, 19:02:06 UTC)
Source: CVE Database V5
Vendor/Project: jsbroks
Product: COCO Annotator

Description

CVE-2026-2108 is a denial of service (DoS) vulnerability affecting jsbroks COCO Annotator versions up to 0. 11. 1. The flaw exists in the /api/info/long_task endpoint, allowing an unauthenticated remote attacker to cause service disruption. The vulnerability has a CVSS 4. 0 score of 6. 9 (medium severity) and does not require user interaction or privileges. Although the vendor was notified, no patch or response has been issued, and public exploit details are available. This could lead to temporary unavailability of annotation services, impacting workflows that rely on COCO Annotator. European organizations using this tool for machine learning or computer vision projects may experience operational interruptions.

AI-Powered Analysis

AILast updated: 02/07/2026, 19:29:44 UTC

Technical Analysis

CVE-2026-2108 is a denial of service vulnerability identified in jsbroks COCO Annotator, an open-source tool used for annotating images in computer vision projects. The vulnerability resides in an unspecified function within the /api/info/long_task endpoint of the application. This endpoint, when manipulated remotely without authentication, can be exploited to cause the application to become unresponsive or crash, resulting in denial of service. The vulnerability affects versions 0.11.0 and 0.11.1 of COCO Annotator. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability protections (VC:N, VI:N, VA:L). The exploit is publicly disclosed, increasing the risk of exploitation, though no known active exploitation in the wild has been reported. The vendor was contacted but has not provided a patch or mitigation guidance. This leaves users exposed to potential service disruptions, which can impact workflows dependent on the availability of annotation services for machine learning data preparation.

Potential Impact

For European organizations, especially those involved in AI, machine learning, and computer vision research or product development, this vulnerability can disrupt critical annotation workflows. Denial of service on the COCO Annotator platform can delay data labeling processes, impacting project timelines and productivity. Organizations relying on this tool for training data preparation may face operational downtime, potentially affecting downstream model accuracy and deployment schedules. The lack of vendor response and patch availability increases risk exposure. Additionally, service unavailability could impact collaborative projects or cloud-based annotation services hosted in Europe, leading to broader operational impacts. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can have significant business consequences in time-sensitive environments.

Mitigation Recommendations

Until an official patch is released, European organizations should implement network-level access controls to restrict access to the /api/info/long_task endpoint, limiting it to trusted internal IP addresses or VPN users. Deploy rate limiting and anomaly detection on this endpoint to prevent abuse and detect potential exploitation attempts early. Consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting this endpoint. Regularly monitor application logs for unusual activity patterns indicative of DoS attempts. If feasible, isolate the COCO Annotator service in a segmented network zone to contain potential disruptions. Engage with the open-source community or maintainers for any unofficial patches or workarounds. Finally, prepare incident response plans to quickly restore service availability in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T14:23:41.354Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69878f40f9fa50a62f7c5181

Added to database: 2/7/2026, 7:15:12 PM

Last enriched: 2/7/2026, 7:29:44 PM

Last updated: 2/7/2026, 9:22:34 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats