CVE-2026-2113
Published: 07 February 2026
Summary
CVE-2026-2113 is a high-severity Improper Input Validation (CWE-20) vulnerability in Tpadmin Project Tpadmin. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.
Untrusted serialized data can be deserialized and observed inside the chamber, blocking gadget-chain exploitation outside the sandbox.
Directly implements checks on information inputs to reject invalid data before processing.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
Penetration testing supplies malicious serialized objects, detecting unsafe deserialization and supporting corrective actions.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Deserialization of untrusted data in a public-facing web component (preview.php) directly enables remote unauthenticated RCE against a web application.
NVD Description
A security vulnerability has been detected in yuan1994 tpadmin up to 1.3.12. This affects an unknown part in the library /public/static/admin/lib/webuploader/0.1.5/server/preview.php of the component WebUploader. The manipulation leads to deserialization. The attack is possible to be carried out remotely. The…
more
exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Deeper analysisAI
CVE-2026-2113 is a deserialization vulnerability in yuan1994 tpadmin versions up to 1.3.12. It affects an unknown part of the WebUploader component, specifically the library file /public/static/admin/lib/webuploader/0.1.5/server/preview.php. The issue is linked to CWE-20 (Improper Input Validation), CWE-502 (Deserialization of Untrusted Data), and CWE-434 (Unrestricted Upload of File with Dangerous Type), with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Remote attackers require no privileges or user interaction to exploit the vulnerability via network access. Successful exploitation leads to deserialization, enabling low-level impacts on confidentiality, integrity, and availability. An exploit has been publicly disclosed and may be used against affected instances.
The vulnerability only affects products no longer supported by the maintainer, implying no official patches are available. Relevant advisories and details are provided in references including a GitHub report on the remote code execution vulnerability in Tpadmin (https://github.com/sTy1H/CVE-Report/blob/main/Remote%20Code%20Execution%20Vulnerability%20in%20Tpadmin%20System.md) and VulDB entries (https://vuldb.com/?ctiid.344688, https://vuldb.com/?id.344688, https://vuldb.com/?submit.746795).
Details
- CWE(s)