Description
Unrestricted Upload of File with Dangerous Type, Deserialization of Untrusted Data vulnerability in datavane tis (tis-plugin/src/main/java/com/qlangtech/tis/extension/impl modules). This vulnerability is associated with program files XmlFile.Java.

This issue affects tis: before v4.3.0.
Published: 2026-01-27
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises when the TIS platform accepts XML files from users and deserializes them using XStream without validating the content or file type. An attacker can supply a crafted XML document that contains a reference to a dangerous file type, and when the platform deserializes it, arbitrary bytecode can be executed. This flaw enables remote code execution, allowing an attacker to run code on the server, potentially taking full control. The weakness is categorized under Unrestricted Upload of File with Dangerous Type (CWE‑434) and Deserialization of Untrusted Data (CWE‑502).

Affected Systems

The affected product is the TIS platform (datavane:tis). Versions prior to 4.3.0 contain the issue in the tis‑plugin module, specifically the XmlFile class in tis-plugin/src/main/java/com/qlangtech/tis/extension/impl. No other versions are known to be affected. Vulnerable implementations must be upgraded to 4.3.0 or later.

Risk and Exploitability

The CVSS score of 10 indicates a critical severity. The EPSS score of less than 1 % suggests that, although the flaw is severe, some analyst estimates the current exploitation likelihood is low; however, the presence of this flaw in a widely used system warrants concern. The flaw was not catalogued in the CISA KEV list, implying no public exploitation reports have been reported. Attackers can likely exploit the vulnerability remotely by uploading a malicious XML file to the public upload endpoint of the TIS service, assuming no authentication or weak authentication is in place. If authentication is required, the attacker would need to compromise valid credentials first. The flaw is a perfect candidate for remote code execution once the deserialization occurs.

Generated by OpenCVE AI on April 18, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade TIS to version 4.3.0 or later where the upload handler validates file types and fixes XStream deserialization.
  • If an upgrade is not immediately feasible, disable or remove the public XML upload feature to prevent attackers from submitting files.
  • Restrict the server‑side file upload path to only allow safe, non‑executable file types and enforce strict MIME type checks.
  • Implement application‑level input validation to reject any files that do not conform to the allowed types and confirm file extensions match the content.

Generated by OpenCVE AI on April 18, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Tue, 27 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Datavane
Datavane tis
Vendors & Products Datavane
Datavane tis

Tue, 27 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type, Deserialization of Untrusted Data vulnerability in datavane tis (tis-plugin/src/main/java/com/qlangtech/tis/extension/impl modules). This vulnerability is associated with program files XmlFile.Java. This issue affects tis: before v4.3.0.
Title A XStream Security Vulnerability in XML Deserialization in datavane/tis
Weaknesses CWE-434
CWE-502
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-01-27T20:41:20.316Z

Reserved: 2026-01-27T08:48:56.893Z

Link: CVE-2026-24815

cve-icon Vulnrichment

Updated: 2026-01-27T20:41:16.316Z

cve-icon NVD

Status : Deferred

Published: 2026-01-27T09:15:51.967

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24815

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:30:15Z

Weaknesses