Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22033: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HumanSignal label-studio

0
High
VulnerabilityCVE-2026-22033cvecve-2026-22033cwe-79cwe-284
Published: Mon Jan 12 2026 (01/12/2026, 17:47:34 UTC)
Source: CVE Database V5
Vendor/Project: HumanSignal
Product: label-studio

Description

Label Studio is a multi-type data labeling and annotation tool. In 1.22.0 and earlier, a persistent stored cross-site scripting (XSS) vulnerability exists in the custom_hotkeys functionality of the application. An authenticated attacker (or one who can trick a user/administrator into updating their custom_hotkeys) can inject JavaScript code that executes in other users’ browsers when those users load any page using the templates/base.html template. Because the application exposes an API token endpoint (/api/current-user/token) to the browser and lacks robust CSRF protection on some API endpoints, the injected script may fetch the victim’s API token or call token reset endpoints — enabling full account takeover and unauthorized API access.

AI-Powered Analysis

AILast updated: 01/12/2026, 18:23:06 UTC

Technical Analysis

CVE-2026-22033 is a persistent stored cross-site scripting (XSS) vulnerability identified in HumanSignal's Label Studio, a multi-type data labeling and annotation tool widely used in machine learning workflows. The flaw exists in versions 1.22.0 and earlier within the custom_hotkeys functionality, where user-supplied input is not properly neutralized before being rendered in the templates/base.html page template. An attacker with authenticated access, or one capable of tricking a legitimate user or administrator into updating their custom hotkeys, can inject arbitrary JavaScript code. This malicious script executes in the browsers of other users who load affected pages, enabling the attacker to perform actions on behalf of victims. The risk is heightened because the application exposes an API token endpoint (/api/current-user/token) directly to the browser and lacks robust Cross-Site Request Forgery (CSRF) protections on certain API endpoints. Consequently, the injected script can retrieve the victim’s API token or invoke token reset endpoints, facilitating full account takeover and unauthorized API access. The vulnerability leverages CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-284 (Improper Access Control). The CVSS 4.0 base score is 8.6, indicating high severity, with attack vector network, low attack complexity, no privileges required beyond authentication, no user interaction, and high impact on confidentiality and integrity. No public exploits have been reported yet, but the potential for abuse is significant given the sensitive nature of API tokens and account control. The vulnerability underscores the importance of secure input handling, strict access controls, and comprehensive CSRF protections in web applications that manage sensitive data and authentication tokens.

Potential Impact

For European organizations, especially those involved in AI, machine learning, and data annotation workflows, this vulnerability poses a significant risk. Exploitation can lead to full account takeover, unauthorized API access, and potential data exfiltration or manipulation. Since Label Studio is often used collaboratively, the persistent XSS can propagate across multiple users, amplifying the impact. Confidentiality is at high risk due to exposure of API tokens, and integrity is compromised by unauthorized actions performed via hijacked accounts. Availability impact is lower but could occur if attackers reset tokens or disrupt user sessions. Organizations handling sensitive or regulated data (e.g., personal data under GDPR) face compliance risks and potential legal consequences if breaches occur. The vulnerability could also be leveraged as a foothold for further lateral movement within networks. Given the network attack vector and no requirement for user interaction, exploitation can be automated and widespread once a vulnerability is known and weaponized.

Mitigation Recommendations

1. Immediately restrict access to the custom_hotkeys feature to trusted administrators only until a patch is available. 2. Apply strict input validation and output encoding on all user-supplied data related to custom hotkeys to prevent script injection. 3. Implement or enhance CSRF protections on all API endpoints, especially those handling authentication tokens and sensitive operations. 4. Monitor and audit changes to custom hotkeys and API token usage for suspicious activity. 5. Educate users and administrators about phishing and social engineering risks that could lead to malicious hotkey updates. 6. Once HumanSignal releases a patched version, promptly upgrade to the fixed release. 7. Consider isolating Label Studio instances in segmented network zones to limit lateral movement if compromise occurs. 8. Employ Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting Label Studio endpoints. 9. Regularly review and rotate API tokens and credentials to minimize exposure windows. 10. Conduct penetration testing and code reviews focused on input handling and authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.719Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696538adda2266e838f1b6a8

Added to database: 1/12/2026, 6:08:45 PM

Last enriched: 1/12/2026, 6:23:06 PM

Last updated: 1/13/2026, 3:52:34 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats