CVE-2026-1879
Received Received - Intake
Unrestricted File Upload in Harvard IQSS Dataverse Theme Customization

Publication date: 2026-04-01

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in Harvard University IQSS Dataverse up to 6.8. This affects an unknown function of the file /ThemeAndWidgets.xhtml of the component Theme Customization. Performing a manipulation of the argument uploadLogo results in unrestricted upload. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 6.10 mitigates this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
harvard_university dataverse to 6.8 (inc)
harvard_university dataverse 6.10
harvard_university dataverse to 6.10 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-1879 is a vulnerability in Harvard University IQSS Dataverse up to version 6.8, specifically in the Theme Customization component's /ThemeAndWidgets.xhtml file. It allows an attacker to perform unrestricted file uploads by manipulating the uploadLogo argument. Although the client-side interface restricts uploads to image files, this validation can be bypassed by intercepting and modifying the HTTP upload request.

An attacker with permissions to edit a Dataverse (such as Administrator, Contributor, or Curator) can upload arbitrary Java Server Pages (JSP) files by changing the filename and content of the upload. This enables the attacker to upload a JSP web shell that allows execution of arbitrary commands on the server with the web server's privileges.

The uploaded JSP files are stored in directories like "/logos/temp/..." or "/logos/...". The web shell executes commands passed via HTTP parameters and returns the output, enabling remote code execution and potentially full server compromise.

The vulnerability is remotely exploitable, the exploit is public, and upgrading to Dataverse version 6.10 mitigates the issue.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including allowing an attacker to execute arbitrary commands on the server hosting the Dataverse application.

  • Full server compromise due to remote code execution.
  • Unauthorized access to databases and sensitive data.
  • Lateral movement within the network, potentially compromising other systems.
  • Persistent access through uploaded web shells, making removal difficult.

Because the exploit is public and the vulnerability allows unrestricted file upload, attackers can easily exploit this if the system is not upgraded or properly secured.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for unauthorized or suspicious JSP files uploaded in the directories used for logo uploads, such as "/logos/temp/" or "/logos/". Since the exploit involves uploading JSP web shells that allow command execution, monitoring these directories for unexpected .jsp files is critical.

Network detection can involve monitoring HTTP requests for unusual file upload activity, especially uploads that bypass client-side restrictions on image file types.

Suggested commands to detect the presence of uploaded JSP web shells on the server include:

  • Find JSP files in logo upload directories: `find /path/to/dataverse/logos/ -name '*.jsp'`
  • Check web server access logs for requests to suspicious JSP files, e.g., `grep ".jsp" /var/log/apache2/access.log` or equivalent.
  • Use network monitoring tools or IDS to detect HTTP POST requests with manipulated uploadLogo parameters or unusual file upload patterns.

What immediate steps should I take to mitigate this vulnerability?

The primary immediate mitigation step is to upgrade the affected Dataverse component to version 6.10, which includes a fix for this vulnerability.

Until the upgrade can be applied, administrators should:

  • Audit and remove any unauthorized JSP files found in the logo upload directories.
  • Restrict permissions to only trusted users who can upload logos or modify themes.
  • Monitor web server logs and network traffic for suspicious activity related to file uploads.
  • Consider temporarily disabling the theme customization upload feature if possible.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not explicitly address how CVE-2026-1879 impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart