Description
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label; and/or get the victim user to upload a maliciously crafted SVG image when configuring a skeleton. This gives the attacker temporary access to all CVAT resources that the victim user can access. Version 2.55.0 fixes the issue.
Published: 2026-01-21
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting (XSS) permitting execution of arbitrary JavaScript in a victim user’s CVAT session
Action: Apply Patch
AI Analysis

Impact

In CVAT versions 2.2.0 through 2.54.0, an attacker who can create a maliciously crafted label or upload an SVG image containing executable script can cause that script to run when a victim user edits the label, views a shape that references the label, or uploads a skeleton SVG. The injected JavaScript executes within the victim’s UI session, granting the attacker temporary access to all resources that the victim user can access.

Affected Systems

The affected product is CVAT, developed by cvat-ai. All releases from 2.2.0 up to and including 2.54.0 are vulnerable. Version 2.55.0 onward contains the fix.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.6, indicating high severity, but the EPSS score is below 1 %, suggesting a low likelihood of exploitation at present. The issue is not listed in the CISA KEV catalog. Exploitation requires the attacker to create a malicious label or upload a crafted SVG and then persuade or trick a victim user to edit or view the associated content. Therefore the vector is most likely user‑interaction‑based XSS delivered via business or project content.

Generated by OpenCVE AI on April 18, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CVAT to version 2.55.0 or later to apply the XSS fix
  • Restrict or monitor users’ ability to create or edit labels and skeleton configurations to avoid malicious content
  • Optionally disable or sanitize SVG uploads used for skeleton configuration to prevent injection attempts

Generated by OpenCVE AI on April 18, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Cvat computer Vision Annotation Tool
CPEs cpe:2.3:a:cvat:cvat:*:*:*:*:*:*:*:* cpe:2.3:a:cvat:computer_vision_annotation_tool:*:*:*:*:*:*:*:*
Vendors & Products Cvat cvat
Cvat computer Vision Annotation Tool

Mon, 02 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Cvat
Cvat cvat
Weaknesses CWE-79
CPEs cpe:2.3:a:cvat:cvat:*:*:*:*:*:*:*:*
Vendors & Products Cvat
Cvat cvat
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Cvat-ai
Cvat-ai cvat
Vendors & Products Cvat-ai
Cvat-ai cvat

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label; and/or get the victim user to upload a maliciously crafted SVG image when configuring a skeleton. This gives the attacker temporary access to all CVAT resources that the victim user can access. Version 2.55.0 fixes the issue.
Title CVAT vulnerable to XSS via skeleton SVG images
Weaknesses CWE-83
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Cvat Computer Vision Annotation Tool
Cvat-ai Cvat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T14:44:33.999Z

Reserved: 2026-01-13T18:22:43.979Z

Link: CVE-2026-23516

cve-icon Vulnrichment

Updated: 2026-01-22T15:12:32.580Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-21T22:15:49.850

Modified: 2026-02-20T20:08:06.990

Link: CVE-2026-23516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:45:04Z

Weaknesses