CVE-2026-33949Path Traversal in Tinacms

Severity
8.1HIGHNVD
EPSS
0.2%
top 63.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1

Description

Tina is a headless content management system. Prior to version 2.2.2, a path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root. This is achieved by manipulating the relativePath parameter in GraphQL mutations. The impact includes the ability to replace critical server configuration files and potentially execute arbitrary commands by sabotaging build script. This issue has been patched in version 2.2.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 2.8 | Impact: 5.2

Affected Packages3 packages

npmtinacms/graphql< 2.2.2
CVEListV5tinacms/tinacms< 2.2.2

🔴Vulnerability Details

3
CVEList
@tinacms/graphql has Path Traversal that leads to overwrite of arbitrary files2026-04-01
GHSA
@tinacms/graphql has Path Traversal that leads to overwrite of arbitrary files2026-03-30
OSV
@tinacms/graphql has Path Traversal that leads to overwrite of arbitrary files2026-03-30

🕵️Threat Intelligence

1
Wiz
CVE-2026-33949 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33949 — Path Traversal in Tinacms | cvebase