Логотип exploitDog
bind:CVE-2025-25296
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-25296

Количество 2

Количество 2

nvd логотип

CVE-2025-25296

12 месяцев назад

Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's `/projects/upload-example` endpoint allows injection of arbitrary HTML through a `GET` request with an appropriately crafted `label_config` query parameter. By crafting a specially formatted XML label config with inline task data containing malicious HTML/JavaScript, an attacker can achieve Cross-Site Scripting (XSS). While the application has a Content Security Policy (CSP), it is only set in report-only mode, making it ineffective at preventing script execution. The vulnerability exists because the upload-example endpoint renders user-provided HTML content without proper sanitization on a GET request. This allows attackers to inject and execute arbitrary JavaScript in victims' browsers by getting them to visit a maliciously crafted URL. This is considered vulnerable because it enables attackers to execute JavaScript in victims' contexts, potentially allowing theft of sensitive data, session hij

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-wpq5-3366-mqw4

12 месяцев назад

Label Studio allows Cross-Site Scripting (XSS) via GET request to `/projects/upload-example` endpoint

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-25296

Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's `/projects/upload-example` endpoint allows injection of arbitrary HTML through a `GET` request with an appropriately crafted `label_config` query parameter. By crafting a specially formatted XML label config with inline task data containing malicious HTML/JavaScript, an attacker can achieve Cross-Site Scripting (XSS). While the application has a Content Security Policy (CSP), it is only set in report-only mode, making it ineffective at preventing script execution. The vulnerability exists because the upload-example endpoint renders user-provided HTML content without proper sanitization on a GET request. This allows attackers to inject and execute arbitrary JavaScript in victims' browsers by getting them to visit a maliciously crafted URL. This is considered vulnerable because it enables attackers to execute JavaScript in victims' contexts, potentially allowing theft of sensitive data, session hij

CVSS3: 6.1
6%
Низкий
12 месяцев назад
github логотип
GHSA-wpq5-3366-mqw4

Label Studio allows Cross-Site Scripting (XSS) via GET request to `/projects/upload-example` endpoint

CVSS3: 6.1
6%
Низкий
12 месяцев назад

Уязвимостей на страницу