Home » Database

AVID-2026-R1042

Description

Server-Side Request Forgery Vulnerability in Computer Vision Annotation Tool (CVAT) (CVE-2022-31188)

Details

CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.

Reason for inclusion in AVID: CVE-2022-31188 describes a server-side request forgery vulnerability in CVAT, an open-source data annotation tool widely used in AI/ML pipelines for labeling training data. This is a software vulnerability in a component (CVAT) that is part of the AI supply chain (data labeling, preprocessing, tooling, and deployment workflows). The vulnerability is security-focused (SSRF, potential data exposure) and the report provides explicit details and references, indicating sufficient evidence for curation.

References

Affected or Relevant Artifacts

  • Developer: cvat-ai
  • Deployer: cvat-ai
  • Artifact Details:
TypeName
Systemcvat

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Base Score8.6
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🟢 Low
Availability Impact🟢 Low

CWE

IDDescription
CWE-918CWE-918: Server-Side Request Forgery (SSRF)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-08-01
  • Version: 0.3.3
  • AVID Entry