Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23516: CWE-83: Improper Neutralization of Script in Attributes in a Web Page in cvat-ai cvat

0
High
VulnerabilityCVE-2026-23516cvecve-2026-23516cwe-83
Published: Wed Jan 21 2026 (01/21/2026, 21:38:32 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVE-2026-23516 is a high-severity cross-site scripting (XSS) vulnerability in the CVAT open-source annotation tool versions 2. 2. 0 through 2. 54. 0. An attacker can execute arbitrary JavaScript in a victim user's session by crafting malicious labels or SVG images, which the victim must view or edit. This allows temporary access to all CVAT resources accessible by the victim. The vulnerability is fixed in version 2. 55. 0.

AI-Powered Analysis

AILast updated: 01/21/2026, 22:05:14 UTC

Technical Analysis

CVE-2026-23516 is a cross-site scripting (XSS) vulnerability classified under CWE-83, affecting the CVAT (Computer Vision Annotation Tool) open-source software versions 2.2.0 through 2.54.0. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability arises from improper neutralization of script in HTML attributes within the web interface. An attacker can exploit this by creating a maliciously crafted label within a CVAT task or project or by uploading a malicious SVG image when configuring a skeleton. When a victim user views or edits the malicious label or views a shape linked to it, or uploads the crafted SVG, the attacker's JavaScript executes in the victim's browser context. This leads to temporary access to all CVAT resources available to the victim user, potentially exposing sensitive annotation data or allowing further malicious actions within the CVAT environment. The attack requires user interaction (viewing or editing the malicious content) but does not require prior authentication or elevated privileges, increasing the attack surface. The vulnerability was assigned CVSS version 4.0 with a score of 8.6, indicating a high severity due to network attack vector, low complexity, no privileges required, but requiring user interaction, and causing high confidentiality and integrity impacts. No known exploits in the wild have been reported as of the publication date (January 21, 2026). The issue is resolved in CVAT version 2.55.0, which presumably includes proper input sanitization and output encoding to neutralize script injection in attributes.

Potential Impact

For European organizations, especially those engaged in AI research, computer vision, and data annotation, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to sensitive annotation data, manipulation of labeling tasks, and potential lateral movement within the CVAT environment. Since CVAT is often used in collaborative settings, a successful attack could compromise multiple users' data and workflows. The temporary access granted to attackers could result in data leakage, integrity violations of annotation projects, and disruption of AI model training pipelines. Given the increasing reliance on AI and machine learning in Europe, such a compromise could affect research integrity, intellectual property, and operational continuity. Additionally, organizations subject to GDPR must consider the data protection implications of unauthorized data access. The requirement for user interaction somewhat limits automated exploitation but does not eliminate risk, especially in environments with many users and frequent collaboration.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade all CVAT instances to version 2.55.0 or later, where the vulnerability is fixed. Until upgrading is possible, organizations should implement strict input validation and sanitization on all user-supplied labels and SVG uploads to prevent script injection. Restricting SVG uploads or disabling skeleton configuration features temporarily can reduce risk. Educate users to be cautious when editing or viewing labels and shapes, especially those created by untrusted sources. Employ Content Security Policy (CSP) headers to limit the impact of potential script execution. Monitor CVAT logs for unusual activity and consider network segmentation to limit the exposure of CVAT servers. Regularly audit user permissions to minimize the number of users who can create or edit labels and upload SVGs. Finally, incorporate vulnerability scanning and penetration testing focused on web application security to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.979Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69714a404623b1157ceef883

Added to database: 1/21/2026, 9:50:56 PM

Last enriched: 1/21/2026, 10:05:14 PM

Last updated: 1/21/2026, 11:01:00 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats