{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-29788","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-04T16:26:02.899Z","datePublished":"2026-03-06T20:31:17.994Z","dateUpdated":"2026-03-09T20:54:30.781Z"},"containers":{"cna":{"title":"TSPortal: Anyone can forge self-deletion requests of any user","problemTypes":[{"descriptions":[{"cweId":"CWE-283","lang":"en","description":"CWE-283: Unverified Ownership","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1287","lang":"en","description":"CWE-1287: Improper Validation of Specified Type of Input","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","subAvailabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:L/SA:H","version":"4.0"}}],"references":[{"name":"https://github.com/miraheze/TSPortal/security/advisories/GHSA-gfhq-7499-f3f2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/miraheze/TSPortal/security/advisories/GHSA-gfhq-7499-f3f2"},{"name":"https://issue-tracker.miraheze.org/T15053","tags":["x_refsource_MISC"],"url":"https://issue-tracker.miraheze.org/T15053"}],"affected":[{"vendor":"miraheze","product":"TSPortal","versions":[{"version":"< 30","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-06T20:31:17.994Z"},"descriptions":[{"lang":"en","value":"TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 30, conversion of empty strings to null allows disguising DPA reports as genuine self-deletion reports. This issue has been patched in version 30."}],"source":{"advisory":"GHSA-gfhq-7499-f3f2","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-29788","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-03-09T20:51:17.114554Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-09T20:54:30.781Z"}}]}}