Description
Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory. When running tinacms dev, the CLI starts a local HTTP server (default port 4001) exposing endpoints such as /media/list/*, /media/upload/*, and /media/*. These endpoints process user-controlled path segments using decodeURI() and path.join() without validating that the resolved path remains within the configured media directory. This vulnerability is fixed in 2.1.8.
Published: 2026-03-12
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file read/write/delete leading to potential full system compromise
Action: Immediate Patch
AI Analysis

Impact

A path traversal vulnerability exists in the TinaCMS CLI development server. The server exposes media endpoints (/media/list/*, /media/upload/*, /media/*) that process user-controlled path segments with decodeURI() and path.join() without verifying that the resolved path remains within the configured media directory. As a result, an attacker can read, modify, or delete any file on the filesystem that the server process can access, potentially exposing sensitive data or tampering with system configuration. The vulnerability is considered a high severity exploit (CVSS 8.4) due to the breadth of impact it allows.

Affected Systems

The vulnerability affects the @tinacms:cli product. Any installation of the TinaCMS CLI older than version 2.1.8 is susceptible. The issue was resolved in update 2.1.8. Those using earlier releases should identify the affected installation and plan an upgrade.

Risk and Exploitability

The CVSS score indicates high potential impact, but the EPSS score is below 1%, suggesting exploitation is currently rare. The issue is not listed in the CISA KEV catalog. The attacker requires network access to the local HTTP server started by the CLI on port 4001; if the dev server is bound to localhost, the attack vector is primarily local. Exposure of the dev server to a network could elevate the threat but still requires the attacker to control or intercept traffic to that port.

Generated by OpenCVE AI on March 18, 2026 at 14:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the TinaCMS CLI to version 2.1.8 or later.

Generated by OpenCVE AI on March 18, 2026 at 14:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2f24-mg4x-534q TinaCMS Vulnerable to Path Traversal Leading to Arbitrary File Read, Write and Delete
History

Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Ssw
Ssw tinacms\/cli
CPEs cpe:2.3:a:ssw:tinacms\/cli:*:*:*:*:*:node.js:*:*
Vendors & Products Ssw
Ssw tinacms\/cli

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tina
Tina tinacms
Vendors & Products Tina
Tina tinacms

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory. When running tinacms dev, the CLI starts a local HTTP server (default port 4001) exposing endpoints such as /media/list/*, /media/upload/*, and /media/*. These endpoints process user-controlled path segments using decodeURI() and path.join() without validating that the resolved path remains within the configured media directory. This vulnerability is fixed in 2.1.8.
Title Path Traversal Leading to Arbitrary File Read, Write and Delete in TinaCMS
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:28:33.184Z

Reserved: 2026-03-03T14:25:19.245Z

Link: CVE-2026-28793

cve-icon Vulnrichment

Updated: 2026-03-13T16:28:21.597Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T17:16:50.543

Modified: 2026-03-13T19:58:55.173

Link: CVE-2026-28793

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:55Z

Weaknesses