{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:54:03.315","vulnerabilities":[{"cve":{"id":"CVE-2025-25295","sourceIdentifier":"security-advisories@github.com","published":"2025-02-14T17:15:20.230","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Label Studio is an open source data labeling tool. A path traversal vulnerability in Label Studio SDK versions prior to 1.0.10 allows unauthorized file access outside the intended directory structure. The flaw exists in the VOC, COCO and YOLO export functionalities. These functions invoke a `download` function on the `label-studio-sdk` python package, which fails to validate file paths when processing image references during task exports. By creating tasks with path traversal sequences in the image field, an attacker can force the application to read files from arbitrary server filesystem locations when exporting projects in any of the mentioned formats. This is authentication-required vulnerability allowing arbitrary file reads from the server filesystem. It may lead to potential exposure of sensitive information like configuration files, credentials, and confidential data. Label Studio versions before 1.16.0 specified SDK versions prior to 1.0.10 as dependencies, and the issue was confirmed in Label Studio version 1.13.2.dev0; therefore, Label Studio users should upgrade to 1.16.0 or newer to mitigate it."},{"lang":"es","value":"Label Studio es una herramienta de etiquetado de datos de código abierto. Una vulnerabilidad de path traversal en las versiones del SDK de Label Studio anteriores a la 1.0.10 permite el acceso no autorizado a archivos fuera de la estructura de directorio prevista. La falla existe en las funcionalidades de exportación de VOC, COCO y YOLO. Estas funciones invocan una función de `descarga` en el paquete de Python `label-studio-sdk`, que no puede validar las rutas de archivo al procesar referencias de imágenes durante las exportaciones de tareas. Al crear tareas con secuencias de path traversal en el campo de imagen, un atacante puede obligar a la aplicación a leer archivos de ubicaciones arbitrarias del sistema de archivos del servidor al exportar proyectos en cualquiera de los formatos mencionados. Esta es una vulnerabilidad que requiere autenticación que permite lecturas arbitrarias de archivos del sistema de archivos del servidor. Puede conducir a la posible exposición de información confidencial como archivos de configuración, credenciales y datos confidenciales. Las versiones de Label Studio anteriores a la 1.16.0 especificaban versiones del SDK anteriores a la 1.0.10 como dependencias, y el problema se confirmó en la versión 1.13.2.dev0 de Label Studio; Por lo tanto, los usuarios de Label Studio deben actualizar a la versión 1.16.0 o más reciente para mitigarlo."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"},{"lang":"en","value":"CWE-26"}]}],"references":[{"url":"https://github.com/HumanSignal/label-studio-sdk/commit/4a9715c6b0b619371e89c09ea8d1c86ce5c880df","source":"security-advisories@github.com"},{"url":"https://github.com/HumanSignal/label-studio/security/advisories/GHSA-rgv9-w7jp-m23g","source":"security-advisories@github.com"}]}}]}