CVE-2025-5173 – label-studio-ml
Package
Manager: pip
Name: label-studio-ml
Vulnerable Version: >=0 <=1.0.9
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00026 pctl0.05417
Details
HumanSignal label-studio-ml-backend Deserialization of Untrusted Data vulnerability A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization. An attack has to be approached locally. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
Metadata
Created: 2025-05-26T09:30:44Z
Modified: 2025-06-06T15:37:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-55g9-6c2x-gf8q/GHSA-55g9-6c2x-gf8q.json
CWE IDs: ["CWE-20", "CWE-502"]
Alternative ID: GHSA-55g9-6c2x-gf8q
Finding: F096
Auto approve: 1