CVE-2026-23526: CWE-267: Privilege Defined With Unsafe Actions in cvat-ai cvat
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.0.0 through 2.54.0, users that have the staff status may freely change their permissions, including giving themselves superuser status and joining the admin group, which gives them full access to the data in the CVAT instance. Version 2.55.0 fixes the issue. As a workaround, review the list of users with staff status and revoke it from any users that are not expected to have superuser privileges.
AI Analysis
Technical Summary
CVE-2026-23526 is a privilege escalation vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) affecting CVAT, an open source interactive video and image annotation tool widely used in computer vision workflows. The vulnerability exists in versions 1.0.0 through 2.54.0, where users assigned the staff status role have the ability to alter their own permissions unchecked. Specifically, staff users can elevate their privileges by assigning themselves superuser status and adding themselves to the admin group. This effectively bypasses intended access controls, granting full administrative rights and unrestricted access to all data managed by the CVAT instance. The vulnerability is remotely exploitable without requiring additional authentication or user interaction, increasing its risk profile. The root cause is insufficient enforcement of permission boundaries for staff users, allowing unsafe privilege modifications. The issue was resolved in CVAT version 2.55.0 by properly restricting permission changes and enforcing role boundaries. No known exploits have been reported in the wild yet, but the high CVSS 8.5 score reflects the critical nature of the flaw due to its impact on confidentiality, integrity, and the ease of exploitation by any staff user.
Potential Impact
The vulnerability allows any user with staff status to escalate privileges to superuser and admin levels, resulting in complete compromise of the CVAT instance. This can lead to unauthorized access, modification, or deletion of sensitive annotation data, intellectual property, or personally identifiable information processed within CVAT. Organizations using CVAT for critical computer vision projects risk data breaches, loss of data integrity, and potential operational disruption. The breach of administrative controls also undermines trust in the system's security and may expose organizations to regulatory and compliance violations. Since CVAT is often deployed in research, commercial AI development, and governmental projects, the impact can be widespread and severe. The vulnerability's remote exploitability without user interaction further increases the threat, enabling insider threats or compromised staff accounts to cause significant damage.
Mitigation Recommendations
1. Upgrade CVAT installations to version 2.55.0 or later immediately to apply the official fix that restricts staff users from modifying their own permissions. 2. Conduct a thorough audit of all users with staff status and revoke this role from any users who do not require it or are not fully trusted. 3. Implement strict access control policies and role assignment procedures to minimize the number of staff users. 4. Monitor logs for unusual permission changes or privilege escalations within CVAT. 5. Consider deploying CVAT behind strong network access controls and VPNs to limit exposure to trusted users only. 6. Regularly review and update user roles and permissions as part of security hygiene. 7. If upgrading immediately is not possible, temporarily disable staff user functionality or restrict it via custom configuration or firewall rules to prevent exploitation.
Affected Countries
United States, Germany, China, India, United Kingdom, France, Japan, South Korea, Canada, Australia
CVE-2026-23526: CWE-267: Privilege Defined With Unsafe Actions in cvat-ai cvat
Description
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.0.0 through 2.54.0, users that have the staff status may freely change their permissions, including giving themselves superuser status and joining the admin group, which gives them full access to the data in the CVAT instance. Version 2.55.0 fixes the issue. As a workaround, review the list of users with staff status and revoke it from any users that are not expected to have superuser privileges.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-23526 is a privilege escalation vulnerability classified under CWE-267 (Privilege Defined With Unsafe Actions) affecting CVAT, an open source interactive video and image annotation tool widely used in computer vision workflows. The vulnerability exists in versions 1.0.0 through 2.54.0, where users assigned the staff status role have the ability to alter their own permissions unchecked. Specifically, staff users can elevate their privileges by assigning themselves superuser status and adding themselves to the admin group. This effectively bypasses intended access controls, granting full administrative rights and unrestricted access to all data managed by the CVAT instance. The vulnerability is remotely exploitable without requiring additional authentication or user interaction, increasing its risk profile. The root cause is insufficient enforcement of permission boundaries for staff users, allowing unsafe privilege modifications. The issue was resolved in CVAT version 2.55.0 by properly restricting permission changes and enforcing role boundaries. No known exploits have been reported in the wild yet, but the high CVSS 8.5 score reflects the critical nature of the flaw due to its impact on confidentiality, integrity, and the ease of exploitation by any staff user.
Potential Impact
The vulnerability allows any user with staff status to escalate privileges to superuser and admin levels, resulting in complete compromise of the CVAT instance. This can lead to unauthorized access, modification, or deletion of sensitive annotation data, intellectual property, or personally identifiable information processed within CVAT. Organizations using CVAT for critical computer vision projects risk data breaches, loss of data integrity, and potential operational disruption. The breach of administrative controls also undermines trust in the system's security and may expose organizations to regulatory and compliance violations. Since CVAT is often deployed in research, commercial AI development, and governmental projects, the impact can be widespread and severe. The vulnerability's remote exploitability without user interaction further increases the threat, enabling insider threats or compromised staff accounts to cause significant damage.
Mitigation Recommendations
1. Upgrade CVAT installations to version 2.55.0 or later immediately to apply the official fix that restricts staff users from modifying their own permissions. 2. Conduct a thorough audit of all users with staff status and revoke this role from any users who do not require it or are not fully trusted. 3. Implement strict access control policies and role assignment procedures to minimize the number of staff users. 4. Monitor logs for unusual permission changes or privilege escalations within CVAT. 5. Consider deploying CVAT behind strong network access controls and VPNs to limit exposure to trusted users only. 6. Regularly review and update user roles and permissions as part of security hygiene. 7. If upgrading immediately is not possible, temporarily disable staff user functionality or restrict it via custom configuration or firewall rules to prevent exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T18:22:43.980Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69714dc34623b1157cef80f5
Added to database: 1/21/2026, 10:05:55 PM
Last enriched: 2/27/2026, 8:42:52 AM
Last updated: 3/26/2026, 4:13:00 AM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.