VYPR
High severityOSV Advisory· Published Jan 12, 2026· Updated Jan 12, 2026

Label Studio vulnerable to full account takeover by chaining Stored XSS + IDOR in User Profile via custom_hotkeys field

CVE-2026-22033

Description

Label Studio is a multi-type data labeling and annotation tool. In 1.22.0 and earlier, a persistent stored cross-site scripting (XSS) vulnerability exists in the custom_hotkeys functionality of the application. An authenticated attacker (or one who can trick a user/administrator into updating their custom_hotkeys) can inject JavaScript code that executes in other users’ browsers when those users load any page using the templates/base.html template. Because the application exposes an API token endpoint (/api/current-user/token) to the browser and lacks robust CSRF protection on some API endpoints, the injected script may fetch the victim’s API token or call token reset endpoints — enabling full account takeover and unauthorized API access.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
label-studioPyPI
<= 1.22.0

Affected products

1

Patches

1
ea2462bf042b

fix: BROS-664: Fix XSS via script injection in custom hotkeys (#9084)

https://github.com/HumanSignal/label-studioNick SkriabinDec 29, 2025via ghsa
1 file changed · +1 2
  • label_studio/templates/base.html+1 2 modified
    @@ -101,8 +101,7 @@
     </template>
     
     <script id="app-settings" nonce="{{request.csp_nonce}}">
    -
    -  var __customHotkeys = {{ user.custom_hotkeys|json_dumps_ensure_ascii|safe }};
    +  var __customHotkeys = {{ user.custom_hotkeys|json_dumps_ensure_ascii|escape_lt_gt|safe }};
     
       // Filter custom hotkeys for editor-specific ones
       var editorCustomHotkeys = {};
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.