We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54573

CVAT vulnerable to email verification bypass by use of basic authentication



Description

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.1.0 through 2.41.0, email verification was not enforced when using Basic HTTP Authentication. As a result, users could create accounts using fake email addresses and use the product as verified users. Additionally, the missing email verification check leaves the system open to bot signups and further usage. CVAT 2.42.0 and later versions contain a fix for the issue. CVAT Enterprise customers have a workaround available; those customers may disable registration to prevent this issue.

Reserved 2025-07-25 | Published 2025-07-30 | Updated 2025-07-30 | Assigner GitHub_M


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-287: Improper Authentication

Product status

>= 1.1.0, < 2.42.0
affected

References

github.com/...i/cvat/security/advisories/GHSA-fxgh-m76j-242q

github.com/...ommit/bc20eff16b8406fbb755f6540e6f269da0c9c5b2

cve.org (CVE-2025-54573)

nvd.nist.gov (CVE-2025-54573)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54573

Support options

Helpdesk Chat, Email, Knowledgebase