Label Studio vulnerable to Cross-site Scripting if `<Choices>` or `<Labels>` are used in labeling config
Description
Summary
On all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a `Choices` or `Labels` tag, resulting in an XSS vulnerability.
Details
Need permission to use the "data import" function. This was reproduced on Label Studio 1.10.1.
PoC
1. Create a project. !Create a project
2. Upload a file containing the payload using the "Upload Files" function. !2 Upload a file containing the payload using the Upload Files function !3 complete
The following are the contents of the files used in the PoC `` { "data": { "prompt": "labelstudio universe image", "images": [ { "value": "id123#0", "style": "margin: 5px", "html": "<img width='400' src='https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif' onload=alert(document.cookie)>" } ] } } ``
3. Select the text-to-image generation labeling template of Ranking and scoring !3 Select the text-to-image generation labelling template for Ranking and scoring !5 save
4. Select a task !4 Select a task
5. Check that the script is running !5 Check that the script is running
Impact
Malicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
label-studioPyPI | < 1.11.0 | 1.11.0 |
Affected products
1- Range: < 1.11.0
Patches
15df9ae3828b9fix: LEAP-444: Implement HTML sanitization in LSF (#5232)
3 files changed · +5 −5
label_studio/frontend/dist/lsf/js/main.js+1 −1 modifiedlabel_studio/frontend/dist/lsf/js/main.js.map+1 −1 modifiedlabel_studio/frontend/dist/lsf/version.json+3 −3 modified@@ -1,6 +1,6 @@ { - "message": "fix: LEAP-381: Remove excess regexp from BEM module", - "commit": "84069d9a309ca80a8275aa18be70d3883d9d3dbf", + "message": "fix: LEAP-444: Implement HTML sanitization in LSF", + "commit": "e24a3068a4e47c8a0ef7bcfbb585ef2490728bee", "branch": "master", - "date": "2023-12-27T22:15:19Z" + "date": "2024-01-03T09:21:14Z" }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-6xv9-957j-qfhgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-26152ghsaADVISORY
- github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8ghsax_refsource_MISCWEB
- github.com/HumanSignal/label-studio/pull/5232ghsax_refsource_MISCWEB
- github.com/HumanSignal/label-studio/releases/tag/1.11.0ghsax_refsource_MISCWEB
- github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhgghsax_refsource_CONFIRMWEB
- github.com/pypa/advisory-database/tree/main/vulns/label-studio/PYSEC-2024-249.yamlghsaWEB
News mentions
0No linked articles in our index yet.