CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.8.1 through 2.52.0, an attacker with an account on a CVAT instance is able to retrieve the contents of any file system directory accessible to the CVAT server. The exposed information is names of contained files and subdirectories. The contents of files are not accessible. Version 2.53.0 contains a patch. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/cvat-ai/cvat/commit/2c24ef0c3f8fd94f6c71cff4eafcf11bfcaa5f91 | Patch |
| https://github.com/cvat-ai/cvat/security/advisories/GHSA-3g7v-xjh7-xmqx | Third Party Advisory Patch |
Configurations
History
No history.
Information
Published : 2025-12-19 18:15
Updated : 2026-01-13 15:20
NVD link : CVE-2025-68430
Mitre link : CVE-2025-68430
CVE.ORG link : CVE-2025-68430
JSON object : View
Products Affected
cvat
- computer_vision_annotation_tool
CWE
CWE-24
Path Traversal: '../filedir'
