← back

CVE-2026-7681

MEDIUM · 6.5
hype MOSTLY HYPE · 28 hack

Early disclosure public but no PoC link, KEV absent, feed noise dominates signal.

What: Authorization bypass in jsbroks COCO Annotator ≤0.11.1 Dataset API via DatasetId parameter manipulation (CVSS 6.5 MEDIUM).

Why it matters: Public exploit disclosed; vendor unresponsive to early notification. No KEV listing yet. Chatter is automated feed aggregation (CVEnew, VulmonFeeds, security blogs) with no defender triage or working PoC confirmation visible in the posts.

Where it's seen: Automated CVE feed tweets and Bluesky repeats. No vendor advisory, no researcher deep-dive, no "I found this in the wild" signals—purely NVD replication within hours of publication.

RISK: MODERATE — Unpatched auth bypass in annotation tool; niche but accessible target; vendor silent.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/3/2026, 8:45:39 AM

A security vulnerability has been detected in jsbroks COCO Annotator up to 0.11.1. Affected by this vulnerability is an unknown functionality of the file backend/webserver/api/datasets.py of the component Dataset API. The manipulation of the argument DatasetId leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Public PoCs on GitHub 1 repo

Articles & coverage 14 articles

Page 1 of 3
NVD details 2 CWE ·0 vendors · 4 refs expand

Description

A security vulnerability has been detected in jsbroks COCO Annotator up to 0.11.1. Affected by this vulnerability is an unknown functionality of the file backend/webserver/api/datasets.py of the component Dataset API. The manipulation of the argument DatasetId leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Weaknesses

References

Top posts driving the trend