AVID-2026-R1660
Description
CVAT allows remote code execution via tracker Nuclio functions (CVE-2025-23045)
Details
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container. This vulnerability affects CVAT deployments that run any of the serverless functions of type tracker from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of type tracker may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such as pickle or jsonpickle, it’s likely to be vulnerable. Upgrade to CVAT 2.26.0 or later. If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you’re running.
Reason for inclusion in AVID: CVE-2025-23045 describes a remote code execution vulnerability in CVAT’s tracker Nuclio functions, allowing an attacker with an account on an affected CVAT instance to run arbitrary code in the Nuclio function container. This is a software vulnerability within AI tooling used in ML data labeling pipelines (CVAT with TransT/SiamMask trackers). It affects components used to build/run AI systems (CVAT deployments, Nuclio function containers, and potential custom tracker functions), making it a software supply-chain issue in the AI software stack. The vulnerability is clearly security-related (RCE/CWE-502) and is supported by CVE/NVD references and remediation guidance. Sufficient evidence is provided in the report.
References
- NVD entry
- https://github.com/cvat-ai/cvat/security/advisories/GHSA-wq36-mxf8-hv62
- https://github.com/cvat-ai/cvat/commit/563e1dfde64b15fa042b23f9d09cd854b35f0366
Affected or Relevant Artifacts
- Developer: cvat-ai
- Deployer: cvat-ai
- Artifact Details:
| Type | Name |
|---|---|
| System | cvat |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-502 | CWE-502: Deserialization of Untrusted Data |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-01-28
- Version: 0.3.3
- AVID Entry