Vulnerability Description
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label; and/or get the victim user to upload a maliciously crafted SVG image when configuring a skeleton. This gives the attacker temporary access to all CVAT resources that the victim user can access. Version 2.55.0 fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cvat | Computer Vision Annotation Tool | >= 2.2.0, < 2.55.0 |
Related Weaknesses (CWE)
References
- https://github.com/cvat-ai/cvat/commit/40800707fe39e3ff76c8d036eb953eb12d764e70Patch
- https://github.com/cvat-ai/cvat/security/advisories/GHSA-3m7p-wx65-c7mpPatchThird Party Advisory
FAQ
What is CVE-2026-23516?
CVE-2026-23516 is a vulnerability with a CVSS score of 5.4 (MEDIUM). CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI...
How severe is CVE-2026-23516?
CVE-2026-23516 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23516?
Check the references section above for vendor advisories and patch information. Affected products include: Cvat Computer Vision Annotation Tool.