Home

Description

Tina is a headless content management system. Prior to 2.1.7, a path traversal vulnerability exists in the TinaCMS development server's media upload handler. The code at media.ts joins user-controlled path segments using path.join() without validating that the resulting path stays within the intended media directory. This allows writing files to arbitrary locations on the filesystem. This vulnerability is fixed in 2.1.7.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-12 | Updated 2026-03-13 | Assigner GitHub_M




HIGH: 7.4CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 2.1.7
affected

References

github.com/...inacms/security/advisories/GHSA-5hxf-c7j4-279c exploit

github.com/...inacms/security/advisories/GHSA-5hxf-c7j4-279c

cve.org (CVE-2026-28791)

nvd.nist.gov (CVE-2026-28791)

Download JSON