CVE-2026-32139
Received Received - Intake
Stored XSS in DataEase SVG Upload Allows Remote Script Execution

Publication date: 2026-03-12

Last updated on: 2026-03-13

Assigner: GitHub, Inc.

Description
Dataease is an open source data visualization analysis tool. In DataEase 2.10.19 and earlier, the static resource upload interface allows SVG uploads. However, backend validation only checks whether the XML is parseable and whether the root node is svg. It does not sanitize active content such as onload/onerror event handlers or script-capable attributes. As a result, an attacker can upload a malicious SVG and then trigger script execution in a browser by visiting the exposed static resource URL, forming a full stored XSS exploitation chain. This vulnerability is fixed in 2.10.20.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-12
Last Modified
2026-03-13
Generated
2026-05-07
AI Q&A
2026-03-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dataease dataease to 2.10.20 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32139 is a Stored Cross-Site Scripting (XSS) vulnerability in DataEase versions 2.10.19 and earlier. It occurs because the static resource upload interface allows uploading SVG files without properly sanitizing active content within them.

The backend validation only checks if the uploaded SVG is parseable XML and if its root node is <svg>. However, it does not remove or sanitize active event handlers like onload or onerror, or other script-capable attributes embedded in the SVG.

As a result, an attacker can upload a malicious SVG containing JavaScript payloads that execute when a victim accesses the SVG URL, enabling a full stored XSS attack.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability allows attackers to execute arbitrary JavaScript code in the context of a victim's browser by uploading a malicious SVG file and tricking users into accessing it."}, {'type': 'list_item', 'content': 'Attackers can steal cookies, session tokens, or other sensitive information.'}, {'type': 'list_item', 'content': 'It can lead to unauthorized actions performed on behalf of the victim.'}, {'type': 'list_item', 'content': 'It compromises the security and integrity of the affected application and its users.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by identifying whether your DataEase installation allows uploading SVG files containing active event handlers or script-capable attributes without proper sanitization.'}, {'type': 'paragraph', 'content': 'One approach is to check if the upload API endpoint "upload/{fileId}" accepts SVG files and if those files are served directly via the static resource URL path "/de2api/static-resource/**".'}, {'type': 'paragraph', 'content': 'You can attempt to upload a test SVG file containing an onload event, such as `<svg onload="alert(\'test\')">`, and then access the uploaded file URL to see if the script executes.'}, {'type': 'paragraph', 'content': 'For network detection, monitor HTTP POST requests to the upload endpoint for SVG files and subsequent GET requests to static resource URLs serving SVGs.'}, {'type': 'paragraph', 'content': 'Specific commands depend on your environment, but examples include:'}, {'type': 'list_item', 'content': 'Using curl to upload a test SVG file: `curl -X POST -F "[email protected]" https://your-dataease-instance/upload/{fileId}`'}, {'type': 'list_item', 'content': 'Using curl or wget to access the uploaded SVG URL: `curl https://your-dataease-instance/de2api/static-resource/{fileId}.svg`'}, {'type': 'list_item', 'content': 'Using network monitoring tools (e.g., tcpdump, Wireshark) to capture POST requests to the upload endpoint and GET requests to static resource URLs.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation is to upgrade DataEase to version 2.10.20 or later, where this vulnerability is fixed by proper sanitization of SVG uploads.

There are no effective workarounds other than upgrading.

Until you can upgrade, consider restricting or disabling SVG uploads via the static resource upload interface to prevent malicious SVG files from being uploaded.

Additionally, monitor and audit uploaded files for suspicious SVG content containing active event handlers or scripts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart