Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23516: CWE-83: Improper Neutralization of Script in Attributes in a Web Page in cvat-ai cvat

0
High
VulnerabilityCVE-2026-23516cvecve-2026-23516cwe-83
Published: Wed Jan 21 2026 (01/21/2026, 21:38:32 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label; and/or get the victim user to upload a maliciously crafted SVG image when configuring a skeleton. This gives the attacker temporary access to all CVAT resources that the victim user can access. Version 2.55.0 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:42:37 UTC

Technical Analysis

CVE-2026-23516 is a cross-site scripting (XSS) vulnerability affecting the open-source computer vision annotation tool CVAT, specifically versions 2.2.0 through 2.54.0. The flaw arises from improper sanitization of user-supplied input in labels and SVG images used within the CVAT UI. An attacker can craft malicious labels embedded with JavaScript or upload specially crafted SVG images when configuring skeletons. When a victim user views or edits these malicious labels or loads the SVG, the embedded script executes within their browser session. This execution context allows the attacker to hijack the victim's session and gain temporary access to all CVAT resources the victim can access, potentially exposing sensitive annotation data or project information. The vulnerability does not require any privileges or authentication on the attacker's part but does require user interaction (viewing or editing the malicious content). The issue is classified under CWE-83, indicating improper neutralization of script in attributes. The vulnerability was publicly disclosed on January 21, 2026, with a CVSS 4.0 base score of 8.6 (high severity), reflecting its ease of exploitation over the network and significant impact on confidentiality and integrity. The issue was resolved in CVAT version 2.55.0 by properly sanitizing inputs and preventing script injection in labels and SVG uploads. No known exploits have been reported in the wild to date.

Potential Impact

The impact of CVE-2026-23516 is significant for organizations using vulnerable versions of CVAT for computer vision annotation tasks. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim user's session, potentially leading to session hijacking, data theft, unauthorized access to sensitive annotation projects, and manipulation or deletion of annotation data. This can compromise the integrity and confidentiality of valuable machine learning training data and related intellectual property. Since CVAT is often used in research, autonomous vehicle development, and AI model training, the exposure of such data could have downstream effects on AI model accuracy and organizational competitive advantage. The vulnerability requires user interaction but no authentication or privileges, increasing the risk in environments where multiple users share access or where attackers can trick users into interacting with malicious content. The temporary access gained can be leveraged for lateral movement within the organization’s infrastructure if CVAT is integrated with other systems. Although no exploits are known in the wild, the high CVSS score and ease of exploitation make timely patching critical to prevent potential attacks.

Mitigation Recommendations

Organizations should upgrade all CVAT instances to version 2.55.0 or later, where the vulnerability is fixed. Until upgrading is possible, administrators should restrict user permissions to limit who can create or edit labels and upload SVG images, minimizing the risk of malicious content injection. Implement strict input validation and sanitization on all user-supplied data, especially labels and SVG uploads, to prevent script injection. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. Educate users about the risks of interacting with untrusted labels or images within CVAT. Monitor CVAT logs and user activity for unusual behavior indicative of exploitation attempts. If CVAT is exposed to the internet, consider placing it behind a web application firewall (WAF) configured to detect and block XSS payloads. Regularly audit and review annotation projects and labels for suspicious content. Finally, integrate CVAT usage within a broader security monitoring and incident response framework to quickly detect and respond to potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.979Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69714a404623b1157ceef883

Added to database: 1/21/2026, 9:50:56 PM

Last enriched: 2/27/2026, 8:42:37 AM

Last updated: 3/24/2026, 11:47:26 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses