CVE-2026-33541
Description
TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 34, a flaw in TSPortal allowed attackers to create arbitrary user records in the database by abusing validation logic. While validation correctly rejected invalid usernames, a side effect within a validation rule caused user records to be created regardless of whether the request succeeded. This could be exploited to cause uncontrolled database growth, leading to a potential denial of service (DoS). Version 34 contains a fix for the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
miraheze/ts-portalPackagist | < 34 | 34 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/miraheze/TSPortal/security/advisories/GHSA-f346-8rp3-4h9hnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-f346-8rp3-4h9hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33541ghsaADVISORY
- issue-tracker.miraheze.org/T15115ghsaWEB
News mentions
0No linked articles in our index yet.