CVE-2025-25295

Source
https://cve.org/CVERecord?id=CVE-2025-25295
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25295.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-25295
Aliases
Published
2025-02-14T16:50:26.336Z
Modified
2025-12-07T10:06:41.430350Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Label Studio has a Path Traversal Vulnerability via image Field
Details

Label Studio is an open source data labeling tool. A path traversal vulnerability in Label Studio SDK versions prior to 1.0.10 allows unauthorized file access outside the intended directory structure. The flaw exists in the VOC, COCO and YOLO export functionalities. These functions invoke a download function on the label-studio-sdk python package, which fails to validate file paths when processing image references during task exports. By creating tasks with path traversal sequences in the image field, an attacker can force the application to read files from arbitrary server filesystem locations when exporting projects in any of the mentioned formats. This is authentication-required vulnerability allowing arbitrary file reads from the server filesystem. It may lead to potential exposure of sensitive information like configuration files, credentials, and confidential data. Label Studio versions before 1.16.0 specified SDK versions prior to 1.0.10 as dependencies, and the issue was confirmed in Label Studio version 1.13.2.dev0; therefore, Label Studio users should upgrade to 1.16.0 or newer to mitigate it.

Database specific
{
    "cwe_ids": [
        "CWE-22",
        "CWE-26"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/25xxx/CVE-2025-25295.json"
}
References

Affected packages

Git / github.com/humansignal/label-studio

Affected ranges

Type
GIT
Repo
https://github.com/humansignal/label-studio
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v.*
v.0.1.0
v.0.1.1
v.0.1.2
v.0.1.4
v.0.1.5
v.0.1.6
v.0.2.0
v.0.2.1-2
v.0.2.1-3
v.0.2.1-4
v.0.2.1-5
v.0.2.1-8
v0.*
v0.2.2
v0.3.0
v0.4.0
v0.4.4
v0.4.5
v0.4.6
v0.4.7
v0.4.8
v0.5.0
v0.5.1
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.7.2
v0.7.3
v0.7.5.post0
v0.8.0
v0.8.1
v0.8.2
v0.9.0
v0.9.0.post3
v0.9.0.post4
v0.9.0.post5
v0.9.1.post0
v0.9.1.post1
v1.*
v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.2.0
v1.3.0
v1.4.0
v1.4.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25295.json"

Git / github.com/humansignal/label-studio-sdk

Affected ranges

Type
GIT
Repo
https://github.com/humansignal/label-studio-sdk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0.2
1.0.3
1.0.4
1.0.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25295.json"