Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29788: CWE-283: Unverified Ownership in miraheze TSPortal

0
High
VulnerabilityCVE-2026-29788cvecve-2026-29788cwe-283cwe-1287
Published: Fri Mar 06 2026 (03/06/2026, 20:31:17 UTC)
Source: CVE Database V5
Vendor/Project: miraheze
Product: TSPortal

Description

TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 30, conversion of empty strings to null allows disguising DPA reports as genuine self-deletion reports. This issue has been patched in version 30.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:41:37 UTC

Technical Analysis

CVE-2026-29788 is a vulnerability classified under CWE-283 (Unverified Ownership) and CWE-1287 affecting miraheze's TSPortal platform, a specialized tool used by the WikiTide Foundation's Trust and Safety team to manage sensitive workflows such as reports, investigations, appeals, and transparency efforts. The root cause lies in the platform's handling of empty string inputs prior to version 30, where these empty strings are converted to null values. This conversion flaw enables attackers to disguise Data Protection Act (DPA) reports as genuine self-deletion reports, effectively bypassing ownership verification controls. By exploiting this, an attacker could manipulate the status or handling of reports, potentially causing unauthorized report dismissals or misclassifications. The vulnerability is remotely exploitable over the network without requiring privileges or authentication, though it requires user interaction. The CVSS 4.0 score of 8.4 reflects a high severity, with a network attack vector, low complexity, no privileges required, and high impact on availability. The vulnerability was publicly disclosed on March 6, 2026, and has been addressed in TSPortal version 30. No known exploits have been observed in the wild to date. The issue highlights the critical importance of proper input validation and ownership verification in trust and safety platforms that handle sensitive user-generated reports and appeals.

Potential Impact

The exploitation of this vulnerability could severely impact organizations relying on TSPortal for managing trust and safety workflows. Attackers could manipulate or disguise reports, leading to unauthorized dismissal or alteration of sensitive Data Protection Act (DPA) complaints. This undermines the integrity and reliability of the reporting and appeals process, potentially allowing malicious actors to evade accountability or disrupt transparency efforts. The availability of the platform could also be affected if reports are mishandled or corrupted. For organizations, this could result in reputational damage, loss of user trust, regulatory non-compliance, and operational disruptions. Since TSPortal is used in sensitive contexts involving user data and legal compliance, the impact extends beyond technical disruption to legal and ethical domains. The lack of required privileges or authentication lowers the barrier for attackers, increasing the risk of widespread exploitation if unpatched systems remain in use.

Mitigation Recommendations

Organizations using TSPortal should immediately upgrade to version 30 or later, where this vulnerability has been patched. Beyond patching, implement strict input validation to prevent empty string to null conversions that could bypass ownership checks. Enhance ownership verification mechanisms to ensure that report status changes are authenticated and authorized, possibly by adding multi-factor verification or audit trails for critical actions. Regularly audit and monitor report handling workflows for anomalies indicative of manipulation attempts. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious requests targeting report submission endpoints. Conduct security training for Trust and Safety teams to recognize potential exploitation patterns. Finally, establish incident response plans specifically addressing manipulation of trust and safety systems to quickly remediate any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.899Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab4093c48b3f10ffd6cdfc

Added to database: 3/6/2026, 9:01:07 PM

Last enriched: 3/14/2026, 7:41:37 PM

Last updated: 4/20/2026, 11:32:22 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses