Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2113: Deserialization in yuan1994 tpadmin

0
Medium
VulnerabilityCVE-2026-2113cvecve-2026-2113
Published: Sat Feb 07 2026 (02/07/2026, 21:02:06 UTC)
Source: CVE Database V5
Vendor/Project: yuan1994
Product: tpadmin

Description

CVE-2026-2113 is a medium-severity remote deserialization vulnerability affecting yuan1994 tpadmin versions up to 1. 3. 12. The flaw exists in the WebUploader component's preview. php script, allowing unauthenticated attackers to manipulate serialized data remotely. Exploitation can lead to partial compromise of confidentiality, integrity, and availability without user interaction or privileges. The product is no longer supported, and no official patches are available. Although no known exploits are currently observed in the wild, public exploit details exist, increasing risk. European organizations using this outdated tpadmin version face potential remote code execution or data manipulation threats. Mitigation requires discontinuing use or isolating affected systems, employing web application firewalls with custom rules, and monitoring network traffic for suspicious deserialization attempts.

AI-Powered Analysis

AILast updated: 02/07/2026, 21:29:30 UTC

Technical Analysis

CVE-2026-2113 identifies a deserialization vulnerability in the yuan1994 tpadmin product, specifically affecting versions 1.3.0 through 1.3.12. The vulnerability resides in the WebUploader component, located at /public/static/admin/lib/webuploader/0.1.5/server/preview.php. Deserialization flaws occur when untrusted data is processed by an application expecting serialized objects, potentially enabling attackers to execute arbitrary code or manipulate application state. In this case, the vulnerability allows remote attackers to send crafted serialized data to the preview.php endpoint without requiring authentication or user interaction. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (low impact on each), as indicated by the CVSS vector. The product is no longer maintained or supported by the vendor, meaning no official patches or updates are available, increasing the risk for users who continue to operate affected versions. Although no known exploits have been observed in the wild, public exploit code has been disclosed, which could facilitate attacks. The vulnerability's ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction needed) makes it a significant concern for exposed systems. The lack of scope change means the impact is confined to the vulnerable component and its privileges. This vulnerability is categorized as medium severity with a CVSS 4.0 base score of 6.9. The WebUploader component is a third-party library integrated into tpadmin, a web-based administrative interface, which may be used in various web applications or internal management portals.

Potential Impact

For European organizations, the vulnerability poses a risk of unauthorized remote code execution or data manipulation on systems running vulnerable versions of yuan1994 tpadmin. This could lead to partial disclosure of sensitive information, unauthorized changes to administrative data, or disruption of service availability. Since the product is no longer supported, organizations cannot rely on vendor patches and must consider alternative mitigation strategies. The impact is heightened for organizations that expose tpadmin interfaces to the internet or have weak network segmentation. Attackers exploiting this vulnerability could gain footholds within internal networks, potentially pivoting to more critical assets. The medium severity score reflects moderate risk, but the ease of exploitation and lack of authentication requirements increase the urgency for mitigation. European entities in sectors such as manufacturing, technology, or government that utilize Chinese-developed administrative tools may be disproportionately affected. Additionally, compliance with GDPR and other data protection regulations could be jeopardized if breaches occur due to this vulnerability.

Mitigation Recommendations

Given the absence of official patches due to end-of-life status, European organizations should prioritize the following mitigations: 1) Immediately identify and inventory all instances of yuan1994 tpadmin in their environment, especially versions up to 1.3.12. 2) Decommission or replace the vulnerable tpadmin installations with supported alternatives or updated administrative interfaces. 3) If immediate replacement is not feasible, isolate affected systems behind strict network segmentation and restrict access to trusted IPs only. 4) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting the preview.php endpoint. 5) Monitor network and application logs for anomalous deserialization attempts or unusual traffic patterns. 6) Conduct internal security assessments and penetration tests focusing on deserialization attack vectors. 7) Educate IT and security teams about the risks of using unsupported software and the importance of timely patching or replacement. 8) Consider implementing runtime application self-protection (RASP) solutions to detect exploitation attempts in real time. 9) Maintain up-to-date backups and incident response plans to minimize impact if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T14:37:20.590Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6987ab60f9fa50a62fbec76e

Added to database: 2/7/2026, 9:15:12 PM

Last enriched: 2/7/2026, 9:29:30 PM

Last updated: 2/8/2026, 4:11:05 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats