Home

Description

Tina is a headless content management system. Prior to 2.1.2, TinaCMS allows users to create, update, and delete content documents using relative file paths (relativePath, newRelativePath) via GraphQL mutations. Under certain conditions, these paths are combined with the collection path using path.join() without validating that the resolved path remains within the collection root directory. Because path.join() does not prevent directory traversal, paths containing ../ sequences can escape the intended directory boundary. This vulnerability is fixed in 2.1.2.

PUBLISHED Reserved 2026-01-21 | Published 2026-03-12 | Updated 2026-03-12 | Assigner GitHub_M




MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 2.1.2
affected

References

github.com/...inacms/security/advisories/GHSA-2238-xc5r-v9hj

cve.org (CVE-2026-24125)

nvd.nist.gov (CVE-2026-24125)

Download JSON