Tina is a headless content management system. Prior to 2.1.7, a path traversal vulnerability exists in the TinaCMS development server's media upload handler. The code at media.ts joins user-controlled path segments using path.join() without validating that the resulting path stays within the intended media directory. This allows writing files to arbitrary locations on the filesystem. This vulnerability is fixed in 2.1.7.
References
| Link | Resource |
|---|---|
| https://github.com/tinacms/tinacms/security/advisories/GHSA-5hxf-c7j4-279c | Exploit Vendor Advisory |
| https://github.com/tinacms/tinacms/security/advisories/GHSA-5hxf-c7j4-279c | Exploit Vendor Advisory |
Configurations
History
13 Mar 2026, 19:55
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ssw
Ssw tinacms\/cli |
|
| CPE | cpe:2.3:a:ssw:tinacms\/cli:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/tinacms/tinacms/security/advisories/GHSA-5hxf-c7j4-279c - Exploit, Vendor Advisory | |
| Summary |
|
12 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 17:16
Updated : 2026-03-13 19:55
NVD link : CVE-2026-28791
Mitre link : CVE-2026-28791
CVE.ORG link : CVE-2026-28791
JSON object : View
Products Affected
ssw
- tinacms\/cli
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
