Home

Description

Label Studio is a multi-type data labeling and annotation tool. In 1.22.0 and earlier, a persistent stored cross-site scripting (XSS) vulnerability exists in the custom_hotkeys functionality of the application. An authenticated attacker (or one who can trick a user/administrator into updating their custom_hotkeys) can inject JavaScript code that executes in other users’ browsers when those users load any page using the templates/base.html template. Because the application exposes an API token endpoint (/api/current-user/token) to the browser and lacks robust CSRF protection on some API endpoints, the injected script may fetch the victim’s API token or call token reset endpoints — enabling full account takeover and unauthorized API access.

PUBLISHED Reserved 2026-01-05 | Published 2026-01-12 | Updated 2026-01-12 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-284: Improper Access Control

Product status

<= 1.22.0
affected

References

github.com/...studio/security/advisories/GHSA-2mq9-hm29-8qch

github.com/HumanSignal/label-studio/pull/9084

github.com/...ommit/ea2462bf042bbf370b79445d02a205fbe547b505

cve.org (CVE-2026-22033)

nvd.nist.gov (CVE-2026-22033)

Download JSON