Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23526: CWE-267: Privilege Defined With Unsafe Actions in cvat-ai cvat

0
High
VulnerabilityCVE-2026-23526cvecve-2026-23526cwe-267
Published: Wed Jan 21 2026 (01/21/2026, 21:40:25 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.0.0 through 2.54.0, users that have the staff status may freely change their permissions, including giving themselves superuser status and joining the admin group, which gives them full access to the data in the CVAT instance. Version 2.55.0 fixes the issue. As a workaround, review the list of users with staff status and revoke it from any users that are not expected to have superuser privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:42:52 UTC

Technical Analysis

CVE-2026-23526 is a privilege escalation vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) affecting CVAT, an open source interactive video and image annotation tool widely used in computer vision workflows. The vulnerability exists in versions 1.0.0 through 2.54.0, where users assigned the staff status role have the ability to alter their own permissions unchecked. Specifically, staff users can elevate their privileges by assigning themselves superuser status and adding themselves to the admin group. This effectively bypasses intended access controls, granting full administrative rights and unrestricted access to all data managed by the CVAT instance. The vulnerability is remotely exploitable without requiring additional authentication or user interaction, increasing its risk profile. The root cause is insufficient enforcement of permission boundaries for staff users, allowing unsafe privilege modifications. The issue was resolved in CVAT version 2.55.0 by properly restricting permission changes and enforcing role boundaries. No known exploits have been reported in the wild yet, but the high CVSS 8.5 score reflects the critical nature of the flaw due to its impact on confidentiality, integrity, and the ease of exploitation by any staff user.

Potential Impact

The vulnerability allows any user with staff status to escalate privileges to superuser and admin levels, resulting in complete compromise of the CVAT instance. This can lead to unauthorized access, modification, or deletion of sensitive annotation data, intellectual property, or personally identifiable information processed within CVAT. Organizations using CVAT for critical computer vision projects risk data breaches, loss of data integrity, and potential operational disruption. The breach of administrative controls also undermines trust in the system's security and may expose organizations to regulatory and compliance violations. Since CVAT is often deployed in research, commercial AI development, and governmental projects, the impact can be widespread and severe. The vulnerability's remote exploitability without user interaction further increases the threat, enabling insider threats or compromised staff accounts to cause significant damage.

Mitigation Recommendations

1. Upgrade CVAT installations to version 2.55.0 or later immediately to apply the official fix that restricts staff users from modifying their own permissions. 2. Conduct a thorough audit of all users with staff status and revoke this role from any users who do not require it or are not fully trusted. 3. Implement strict access control policies and role assignment procedures to minimize the number of staff users. 4. Monitor logs for unusual permission changes or privilege escalations within CVAT. 5. Consider deploying CVAT behind strong network access controls and VPNs to limit exposure to trusted users only. 6. Regularly review and update user roles and permissions as part of security hygiene. 7. If upgrading immediately is not possible, temporarily disable staff user functionality or restrict it via custom configuration or firewall rules to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69714dc34623b1157cef80f5

Added to database: 1/21/2026, 10:05:55 PM

Last enriched: 2/27/2026, 8:42:52 AM

Last updated: 3/26/2026, 4:13:00 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses