CVE-2025-5173

A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization. An attack has to be approached locally. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
References
Link Resource
https://github.com/HumanSignal/label-studio-ml-backend/issues/765 Vendor Advisory Issue Tracking
https://vuldb.com/?ctiid.310261 Permissions Required VDB Entry
https://vuldb.com/?id.310261 Third Party Advisory VDB Entry
https://vuldb.com/?submit.578126 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:humansignal:label_studio_ml_backend:*:*:*:*:*:*:*:*

History

03 Jun 2025, 15:43

Type Values Removed Values Added
First Time Humansignal
Humansignal label Studio Ml Backend
CPE cpe:2.3:a:humansignal:label_studio_ml_backend:*:*:*:*:*:*:*:*
References () https://github.com/HumanSignal/label-studio-ml-backend/issues/765 - () https://github.com/HumanSignal/label-studio-ml-backend/issues/765 - Vendor Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.310261 - () https://vuldb.com/?ctiid.310261 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.310261 - () https://vuldb.com/?id.310261 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.578126 - () https://vuldb.com/?submit.578126 - Third Party Advisory, VDB Entry

28 May 2025, 15:01

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en HumanSignal label-studio-ml-backend hasta 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf, clasificada como problemática. Esta vulnerabilidad afecta la función de carga del archivo label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py del componente PT File Handler. La manipulación de la ruta de argumentos provoca la deserialización. Un ataque debe abordarse localmente. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de información sobre las versiones afectadas ni sobre las actualizadas.

26 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-26 07:15

Updated : 2025-06-03 15:43


NVD link : CVE-2025-5173

Mitre link : CVE-2025-5173

CVE.ORG link : CVE-2025-5173


JSON object : View

Products Affected

humansignal

  • label_studio_ml_backend
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data