Description
Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply tricking them into visiting a malicious website while tinacms dev is running. This vulnerability is fixed in 2.1.8.
Published: 2026-03-12
Score: 9.7 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

The vulnerability in the TinaCMS CLI dev server allows an attacker to combine a permissive CORS policy (Access‑Control‑Allow‑Origin: *) with a pre‑existing path traversal flaw to enumerate the local filesystem, write arbitrary files, and delete files on a developer’s machine. Key weaknesses include unvalidated file paths (CWE‑22) and insecure resource handling (CWE‑942). The result is that a malicious user could upload and execute code or modify critical configuration files, resulting in full compromise of the developer’s environment.

Affected Systems

The flaw affects the TinaCMS CLI component from the vendor ssw, version numbers prior to 2.1.8. Any instance of the dev server running before that patch is vulnerable, regardless of the Node.js runtime version.

Risk and Exploitability

The CVSS score of 9.7 indicates critical severity, but the EPSS score of less than 1% suggests low exploitation probability at this time, and the vulnerability is not listed in the CISA KEV catalog. However, the attack requires only that a compromised or malicious web page be loaded while the dev server is running, which is a realistic scenario for developers leaving the dev server exposed. The combined permissive CORS and path traversal enable a direct browser‑based drive‑by attack, making the vulnerability highly exploitable where conditions are met.

Generated by OpenCVE AI on March 18, 2026 at 14:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade TinaCMS CLI to version 2.1.8 or later
  • If upgrading immediately is not possible, configure the dev server to restrict CORS origins or disable CORS entirely

Generated by OpenCVE AI on March 18, 2026 at 14:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8pw3-9m7f-q734 TinaCMS CLI Dev Server Vulnerable to Cross-Origin File Exfiltration via CORS Misconfiguration + Path Traversal in TinaCMS
History

Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Ssw
Ssw tinacms\/cli
CPEs cpe:2.3:a:ssw:tinacms\/cli:*:*:*:*:*:node.js:*:*
Vendors & Products Ssw
Ssw tinacms\/cli

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tina
Tina tinacms
Vendors & Products Tina
Tina tinacms

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply tricking them into visiting a malicious website while tinacms dev is running. This vulnerability is fixed in 2.1.8.
Title Cross-Origin File Exfiltration via CORS Misconfiguration + Path Traversal in TinaCMS
Weaknesses CWE-22
CWE-942
References
Metrics cvssV3_1

{'score': 9.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:29:06.236Z

Reserved: 2026-03-03T14:25:19.245Z

Link: CVE-2026-28792

cve-icon Vulnrichment

Updated: 2026-03-13T16:28:55.395Z

cve-icon NVD

Status : Modified

Published: 2026-03-12T17:16:50.387

Modified: 2026-03-13T19:54:32.090

Link: CVE-2026-28792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:56Z

Weaknesses