XML Hell: Critical RCE in Datavane TIS via XStream
Vulnerability ID: CVE-2026-24815
CVSS Score: 10.0
Published: 2026-01-27
Data integration platforms are a goldmine for attackers—they sit at the center of your infrastructure, holding the keys to the kingdom. Datavane's 'tis' platform recently handed over those keys via a classic, almost nostalgic vulnerability: XStream deserialization.
By combining an unrestricted file upload with an insecurely configured XML parser, the platform allows unauthenticated attackers to execute arbitrary code with the privileges of the application. This isn't just a bug; it's a CVSS 10.0 catastrophe that turns a simple XML file into a remote shell.
TL;DR
Critical RCE (CVSS 10.0) in Datavane TIS versions < 4.3.0. An unauthenticated attacker can upload a malicious XML file which, when parsed by the application's insecure XStream library, executes arbitrary commands on the server.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-502 (Deserialization of Untrusted Data)
- CVSS v4.0: 10.0 (Critical)
- Attack Vector: Network (File Upload)
- Impact: Remote Code Execution (RCE)
- EPSS Score: 0.00041 (Low, but rising)
- Patch Status: Fixed in v4.3.0
Affected Systems
- datavane/tis (versions < 4.3.0)
- tis-plugin module
-
tis: < 4.3.0 (Fixed in:
4.3.0)
Code Analysis
Commit: b4f2c8d
Fix XStream deserialization vulnerability by adding type permissions
+ xs.allowTypesByWildcard(new String[] { "com.qlangtech.tis.**" });
+ xs.denyTypes(new Class[] { java.lang.ProcessBuilder.class });
Exploit Details
- GitHub: Vulnerability disclosure and fix in PR discussion
Mitigation Strategies
- Upgrade to version 4.3.0 immediately.
- Implement strict XStream allowlisting if maintaining a fork.
- Restrict network access to the TIS interface.
Remediation Steps:
- Download the TIS v4.3.0 release package.
- Stop the running TIS server instance.
- Replace the
tis-pluginjar files or the entire application distribution. - Restart the server.
- Verify the version in the administration console.
References
Read the full report for CVE-2026-24815 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)