CVE-2026-29788: CWE-283: Unverified Ownership in miraheze TSPortal
TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 30, conversion of empty strings to null allows disguising DPA reports as genuine self-deletion reports. This issue has been patched in version 30.
AI Analysis
Technical Summary
CVE-2026-29788 is a vulnerability classified under CWE-283 (Unverified Ownership) and CWE-1287 affecting miraheze's TSPortal platform, a specialized tool used by the WikiTide Foundation's Trust and Safety team to manage sensitive workflows such as reports, investigations, appeals, and transparency efforts. The root cause lies in the platform's handling of empty string inputs prior to version 30, where these empty strings are converted to null values. This conversion flaw enables attackers to disguise Data Protection Act (DPA) reports as genuine self-deletion reports, effectively bypassing ownership verification controls. By exploiting this, an attacker could manipulate the status or handling of reports, potentially causing unauthorized report dismissals or misclassifications. The vulnerability is remotely exploitable over the network without requiring privileges or authentication, though it requires user interaction. The CVSS 4.0 score of 8.4 reflects a high severity, with a network attack vector, low complexity, no privileges required, and high impact on availability. The vulnerability was publicly disclosed on March 6, 2026, and has been addressed in TSPortal version 30. No known exploits have been observed in the wild to date. The issue highlights the critical importance of proper input validation and ownership verification in trust and safety platforms that handle sensitive user-generated reports and appeals.
Potential Impact
The exploitation of this vulnerability could severely impact organizations relying on TSPortal for managing trust and safety workflows. Attackers could manipulate or disguise reports, leading to unauthorized dismissal or alteration of sensitive Data Protection Act (DPA) complaints. This undermines the integrity and reliability of the reporting and appeals process, potentially allowing malicious actors to evade accountability or disrupt transparency efforts. The availability of the platform could also be affected if reports are mishandled or corrupted. For organizations, this could result in reputational damage, loss of user trust, regulatory non-compliance, and operational disruptions. Since TSPortal is used in sensitive contexts involving user data and legal compliance, the impact extends beyond technical disruption to legal and ethical domains. The lack of required privileges or authentication lowers the barrier for attackers, increasing the risk of widespread exploitation if unpatched systems remain in use.
Mitigation Recommendations
Organizations using TSPortal should immediately upgrade to version 30 or later, where this vulnerability has been patched. Beyond patching, implement strict input validation to prevent empty string to null conversions that could bypass ownership checks. Enhance ownership verification mechanisms to ensure that report status changes are authenticated and authorized, possibly by adding multi-factor verification or audit trails for critical actions. Regularly audit and monitor report handling workflows for anomalies indicative of manipulation attempts. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious requests targeting report submission endpoints. Conduct security training for Trust and Safety teams to recognize potential exploitation patterns. Finally, establish incident response plans specifically addressing manipulation of trust and safety systems to quickly remediate any exploitation attempts.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, Sweden, Japan, South Korea
CVE-2026-29788: CWE-283: Unverified Ownership in miraheze TSPortal
Description
TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 30, conversion of empty strings to null allows disguising DPA reports as genuine self-deletion reports. This issue has been patched in version 30.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-29788 is a vulnerability classified under CWE-283 (Unverified Ownership) and CWE-1287 affecting miraheze's TSPortal platform, a specialized tool used by the WikiTide Foundation's Trust and Safety team to manage sensitive workflows such as reports, investigations, appeals, and transparency efforts. The root cause lies in the platform's handling of empty string inputs prior to version 30, where these empty strings are converted to null values. This conversion flaw enables attackers to disguise Data Protection Act (DPA) reports as genuine self-deletion reports, effectively bypassing ownership verification controls. By exploiting this, an attacker could manipulate the status or handling of reports, potentially causing unauthorized report dismissals or misclassifications. The vulnerability is remotely exploitable over the network without requiring privileges or authentication, though it requires user interaction. The CVSS 4.0 score of 8.4 reflects a high severity, with a network attack vector, low complexity, no privileges required, and high impact on availability. The vulnerability was publicly disclosed on March 6, 2026, and has been addressed in TSPortal version 30. No known exploits have been observed in the wild to date. The issue highlights the critical importance of proper input validation and ownership verification in trust and safety platforms that handle sensitive user-generated reports and appeals.
Potential Impact
The exploitation of this vulnerability could severely impact organizations relying on TSPortal for managing trust and safety workflows. Attackers could manipulate or disguise reports, leading to unauthorized dismissal or alteration of sensitive Data Protection Act (DPA) complaints. This undermines the integrity and reliability of the reporting and appeals process, potentially allowing malicious actors to evade accountability or disrupt transparency efforts. The availability of the platform could also be affected if reports are mishandled or corrupted. For organizations, this could result in reputational damage, loss of user trust, regulatory non-compliance, and operational disruptions. Since TSPortal is used in sensitive contexts involving user data and legal compliance, the impact extends beyond technical disruption to legal and ethical domains. The lack of required privileges or authentication lowers the barrier for attackers, increasing the risk of widespread exploitation if unpatched systems remain in use.
Mitigation Recommendations
Organizations using TSPortal should immediately upgrade to version 30 or later, where this vulnerability has been patched. Beyond patching, implement strict input validation to prevent empty string to null conversions that could bypass ownership checks. Enhance ownership verification mechanisms to ensure that report status changes are authenticated and authorized, possibly by adding multi-factor verification or audit trails for critical actions. Regularly audit and monitor report handling workflows for anomalies indicative of manipulation attempts. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious requests targeting report submission endpoints. Conduct security training for Trust and Safety teams to recognize potential exploitation patterns. Finally, establish incident response plans specifically addressing manipulation of trust and safety systems to quickly remediate any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.899Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ab4093c48b3f10ffd6cdfc
Added to database: 3/6/2026, 9:01:07 PM
Last enriched: 3/14/2026, 7:41:37 PM
Last updated: 4/20/2026, 11:32:22 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.