Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f346-8rp3-4h9h | TSPortal's Uncontrolled User Creation via Validation Side Effects Leads to Potential Denial of Service |
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wikitide
Wikitide tsportal |
|
| CPEs | cpe:2.3:a:wikitide:tsportal:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wikitide
Wikitide tsportal |
Fri, 27 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Miraheze
Miraheze tsportal |
|
| Vendors & Products |
Miraheze
Miraheze tsportal |
Thu, 26 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 34, a flaw in TSPortal allowed attackers to create arbitrary user records in the database by abusing validation logic. While validation correctly rejected invalid usernames, a side effect within a validation rule caused user records to be created regardless of whether the request succeeded. This could be exploited to cause uncontrolled database growth, leading to a potential denial of service (DoS). Version 34 contains a fix for the issue. | |
| Title | TSPortal's Uncontrolled User Creation via Validation Side Effects Leads to Potential Denial of Service | |
| Weaknesses | CWE-400 CWE-770 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T20:01:35.174Z
Reserved: 2026-03-20T18:05:11.832Z
Link: CVE-2026-33541
Updated: 2026-03-27T19:52:12.106Z
Status : Analyzed
Published: 2026-03-26T21:17:05.867
Modified: 2026-04-03T20:20:56.697
Link: CVE-2026-33541
No data.
OpenCVE Enrichment
Updated: 2026-04-07T08:08:56Z
Github GHSA