Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23516: CWE-83: Improper Neutralization of Script in Attributes in a Web Page in cvat-ai cvat

0
High
VulnerabilityCVE-2026-23516cvecve-2026-23516cwe-83
Published: Wed Jan 21 2026 (01/21/2026, 21:38:32 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVE-2026-23516 is a high-severity cross-site scripting (XSS) vulnerability in the CVAT open source video and image annotation tool, affecting versions 2. 2. 0 through 2. 54. 0. An attacker can execute arbitrary JavaScript in a victim's CVAT UI session by creating malicious labels or uploading crafted SVG images, leading to temporary access to all resources available to the victim user. Exploitation requires user interaction, such as viewing or editing the malicious label or uploading a malicious SVG during skeleton configuration. The vulnerability is fixed in version 2. 55. 0.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:39:31 UTC

Technical Analysis

CVE-2026-23516 is an improper neutralization of script in attributes vulnerability (CWE-83) found in the CVAT (Computer Vision Annotation Tool) open source project, versions 2.2.0 through 2.54.0. CVAT is widely used for interactive video and image annotation in computer vision workflows. The vulnerability allows an attacker to inject arbitrary JavaScript code into the CVAT user interface by crafting malicious labels within tasks or projects or by uploading malicious SVG images when configuring skeletons. When a victim user views or edits these malicious labels or loads the crafted SVG, the injected script executes in their browser context, granting the attacker temporary access to all CVAT resources accessible by that user. This includes potentially sensitive annotation data and project information. The attack vector requires no prior authentication or privileges but does require user interaction (viewing/editing the malicious content). The CVSS 4.0 base score is 8.6 (high severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality and integrity. The vulnerability was publicly disclosed on January 21, 2026, and fixed in CVAT version 2.55.0. No known exploits have been reported in the wild at the time of disclosure.

Potential Impact

For European organizations utilizing CVAT for computer vision annotation tasks, this vulnerability poses a significant risk of unauthorized access to sensitive annotation data, project metadata, and potentially other integrated systems if CVAT is linked to broader infrastructure. Successful exploitation could lead to data leakage, manipulation of annotation results, or session hijacking, undermining the integrity and confidentiality of AI training datasets and workflows. Given the collaborative nature of CVAT, attackers could leverage this vulnerability to pivot within an organization’s AI development environment, potentially impacting intellectual property and compliance with data protection regulations such as GDPR. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with multiple users and shared projects. The absence of known exploits in the wild reduces immediate threat but does not preclude targeted attacks, particularly against organizations with high-value AI assets.

Mitigation Recommendations

European organizations should immediately upgrade CVAT installations to version 2.55.0 or later, where the vulnerability is patched. Until upgrades are applied, restrict user permissions to limit who can create or edit labels and upload SVG images, thereby reducing the attack surface. Implement strict input validation and sanitization on all user-generated content, especially labels and SVG files, to prevent script injection. Employ Content Security Policy (CSP) headers in the CVAT web application to restrict the execution of unauthorized scripts. Conduct user awareness training to recognize suspicious labels or unexpected UI behavior. Monitor CVAT logs and user activity for unusual interactions with labels or SVG uploads. Consider isolating CVAT environments from critical networks and sensitive data stores to contain potential breaches. Regularly review and audit CVAT configurations and access controls to ensure adherence to security best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.979Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69714a404623b1157ceef883

Added to database: 1/21/2026, 9:50:56 PM

Last enriched: 1/29/2026, 8:39:31 AM

Last updated: 2/7/2026, 6:09:24 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats