Impact
A flaw in TSPortal prior to version 30 allows an attacker to forge a self‑deletion request by converting an empty string into a null value. This bypasses the intended separation between Data Privacy Act reports and genuine self‑deletion submissions, letting the attacker delete any user account. The weakness falls under authorized‑access‑bypass via user‑controlled input (CWE‑283) and improper input validation (CWE‑1287). The result is loss of user data and potential denial of service for the affected platform.
Affected Systems
Miraheze's TSPortal platform, versions older than 30, used by the WikiTide Foundation Trust and Safety team.
Risk and Exploitability
The vulnerability carries a CVSS of 8.4, indicating a high severity impact, while the EPSS score is below 1%, implying low current exploitation probability. The vulnerability is not flagged in CISA's KEV catalog. Based on the description, an attacker can exploit the issue by sending forged deletion requests to the platform's API or user interface, potentially without additional authentication. The exploit requires no intricate conditions, making it straightforward for malicious actors who can target any user account.
OpenCVE Enrichment
Github GHSA