Impact
Tina CMS provides media endpoints that validate requested paths by string comparison only. This flaw allows an attacker to supply a file name such as pivot/written-from-media.txt that points to an existing symbolic link or junction outside the intended media directory. Because the code does not resolve symlink targets, system file operations are performed through the link, enabling out‑of‑root file listing, reading, writing, and deletion. The weakness is a classic directory traversal (CWE‑22) amplified by improper path resolution (CWE‑59).
Affected Systems
All releases of @tinacms/cli older than version 2.2.2 are affected. The vulnerability is present in the Tina CMS “tinacms” product, which uses the command‑line interface component for media handling.
Risk and Exploitability
The CVSS score of 7.1 signals high severity, while the EPSS probability of less than 1% indicates a low likelihood of exploitation in the wild. The issue is not listed in the CISA KEV catalog. Exploitation requires an attacker to influence the media request with a crafted file path; this can be achieved by a user with permission to create or alter symbolic links in the media root or by an attacker who controls the input to the media API. If the API is exposed to unauthenticated clients, remote exploitation is straightforward; restricting access or removing link traversal vulnerabilities mitigates the risk.
OpenCVE Enrichment
Github GHSA