Dataease is an open source data visualization analysis tool. In DataEase 2.10.19 and earlier, the static resource upload interface allows SVG uploads. However, backend validation only checks whether the XML is parseable and whether the root node is svg. It does not sanitize active content such as onload/onerror event handlers or script-capable attributes. As a result, an attacker can upload a malicious SVG and then trigger script execution in a browser by visiting the exposed static resource URL, forming a full stored XSS exploitation chain. This vulnerability is fixed in 2.10.20.
References
| Link | Resource |
|---|---|
| https://github.com/dataease/dataease/security/advisories/GHSA-wx8m-vf8v-crvr | Exploit Vendor Advisory |
Configurations
History
13 Mar 2026, 16:02
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://github.com/dataease/dataease/security/advisories/GHSA-wx8m-vf8v-crvr - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Dataease dataease
Dataease |
12 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 18:16
Updated : 2026-03-13 16:02
NVD link : CVE-2026-32139
Mitre link : CVE-2026-32139
CVE.ORG link : CVE-2026-32139
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
