Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23526: CWE-267: Privilege Defined With Unsafe Actions in cvat-ai cvat

0
High
VulnerabilityCVE-2026-23526cvecve-2026-23526cwe-267
Published: Wed Jan 21 2026 (01/21/2026, 21:40:25 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVE-2026-23526 is a high-severity privilege escalation vulnerability in the CVAT open source annotation tool versions 1. 0. 0 through 2. 54. 0. Users with staff status can exploit this flaw to escalate their privileges by modifying their own permissions, including granting themselves superuser status and joining the admin group. This grants full access to all data within the CVAT instance without requiring authentication or user interaction. The vulnerability is fixed in version 2. 55. 0.

AI-Powered Analysis

AILast updated: 01/21/2026, 22:20:16 UTC

Technical Analysis

CVE-2026-23526 is a privilege escalation vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) affecting the CVAT (Computer Vision Annotation Tool) open source software versions from 1.0.0 up to 2.54.0. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability arises because users assigned the 'staff' status have the ability to alter their own permissions within the system, including elevating themselves to superuser status and joining the admin group. This escalation bypasses intended access controls, granting full administrative privileges and unrestricted access to all data managed by the CVAT instance. The flaw requires no user interaction and no additional authentication beyond having staff status, making it trivially exploitable by any staff user. The vulnerability was assigned a CVSS 4.0 score of 8.5, reflecting its high impact on confidentiality and integrity, with network attack vector and low attack complexity. The issue was resolved in CVAT version 2.55.0. As an interim mitigation, organizations are advised to audit and remove staff status from any users who do not require elevated privileges to prevent unauthorized privilege escalation. No public exploits have been reported to date, but the vulnerability poses a significant risk to environments where CVAT is used to handle sensitive or proprietary data.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those in sectors relying heavily on computer vision data annotation such as automotive, healthcare, manufacturing, and research institutions. Unauthorized privilege escalation can lead to full administrative control over the CVAT platform, enabling attackers or malicious insiders to access, modify, or exfiltrate sensitive annotated datasets. This can compromise intellectual property, violate data protection regulations such as GDPR, and disrupt critical AI/ML development workflows. The integrity of annotated data is crucial for training accurate machine learning models; thus, tampering could degrade model performance or introduce biases. Additionally, unauthorized access could lead to lateral movement within the network if CVAT instances are integrated with other internal systems. The vulnerability’s ease of exploitation and high impact on confidentiality and integrity make it a critical risk for European entities using vulnerable CVAT versions.

Mitigation Recommendations

1. Upgrade all CVAT instances to version 2.55.0 or later immediately to apply the official fix. 2. Conduct a thorough audit of all users with staff status and revoke this status from any users who do not require it for their role. 3. Implement strict role-based access control (RBAC) policies to limit the assignment of staff status only to trusted administrators. 4. Monitor CVAT logs for unusual permission changes or privilege escalation attempts. 5. Isolate CVAT instances within segmented network zones to limit potential lateral movement in case of compromise. 6. Regularly review and update user permissions and conduct periodic security assessments of the CVAT environment. 7. Educate administrators and users about the risks associated with privilege escalation and the importance of least privilege principles. 8. If feasible, implement multi-factor authentication (MFA) for administrative access to CVAT to add an additional security layer.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69714dc34623b1157cef80f5

Added to database: 1/21/2026, 10:05:55 PM

Last enriched: 1/21/2026, 10:20:16 PM

Last updated: 1/22/2026, 12:22:02 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats