CVE-2023-47115
Python vulnerability analysis and mitigation

Overview

Label Studio, a popular open source data labeling tool, versions prior to 1.9.2 contained a cross-site scripting (XSS) vulnerability (CVE-2023-47115). The vulnerability could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as an HTML file on the website. The issue was discovered in August 2023 by Alex Brown from elttam and was patched in version 1.9.2 (GitHub Advisory).

Technical details

The vulnerability exists because Label Studio only verifies that uploaded avatar files are images by extracting dimensions, without properly validating file extensions on the server side. The application uses Django's built-in serve view, which determines the Content-Type based on the file extension in the URL path. An attacker could bypass the client-side file extension validation and upload an image containing malicious HTML code with a .html extension, causing it to be rendered as an HTML page. The vulnerability has a CVSS v3.1 base score of 5.4 (Medium) according to NVD, with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

When exploited, this vulnerability allows attackers to execute arbitrary JavaScript in the context of the Label Studio website when users visit a crafted avatar image. For example, an attacker could craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the compromised avatar image (GitHub Advisory).

Mitigation and workarounds

The vulnerability was fixed in Label Studio version 1.9.2. The recommended mitigations include: validating file extensions on the server side instead of client-side code, removing the use of Django's serve view and implementing a secure controller for viewing uploaded avatar images, considering saving file content in the database rather than on the filesystem, and avoiding trust in user-controlled inputs (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22033HIGH8.6
  • PythonPython
  • label-studio
NoNoJan 12, 2026
CVE-2025-68472HIGH8.1
  • PythonPython
  • mindsdb
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22250LOW2.5
  • PythonPython
  • wlc
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management