Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
Dataease 2.10.19 and earlier allows malicious SVG uploads
CVE-2026-32139
Summary
Dataease users are at risk of malicious SVG uploads that can execute scripts in a browser if visited. This can happen when an attacker uploads a malicious SVG file to Dataease and shares the link. You can protect your users by updating Dataease to version 2.10.20 or later.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dataease | dataease | <= 2.10.20 | – |
Original title
Dataease is an open source data visualization analysis tool. In DataEase 2.10.19 and earlier, the static resource upload interface allows SVG uploads. However, backend validation only checks whethe...
Original description
Dataease is an open source data visualization analysis tool. In DataEase 2.10.19 and earlier, the static resource upload interface allows SVG uploads. However, backend validation only checks whether the XML is parseable and whether the root node is svg. It does not sanitize active content such as onload/onerror event handlers or script-capable attributes. As a result, an attacker can upload a malicious SVG and then trigger script execution in a browser by visiting the exposed static resource URL, forming a full stored XSS exploitation chain. This vulnerability is fixed in 2.10.20.
nvd CVSS4.0
5.3
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 12 Mar 2026 · Updated: 14 Mar 2026 · First seen: 12 Mar 2026