CVE-2026-34603Path Traversal in Tinacms

Severity
8.3HIGHNVD
CNA7.1
EPSS
0.1%
top 77.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1

Description

Tina is a headless content management system. Prior to version 2.2.2, @tinacms/cli recently added lexical path-traversal checks to the dev media routes, but the implementation still validates only the path string and does not resolve symlink or junction targets. If a link already exists under the media root, Tina accepts a path like pivot/written-from-media.txt as "inside" the media directory and then performs real filesystem operations through that link target. This allows out-of-root media lis

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:LExploitability: 2.8 | Impact: 5.5

Affected Packages3 packages

CVEListV5tinacms/tinacms< 2.2.2
npmtinacms/graphql< 2.2.2
NVDssw/tinacms_cli2.2.1

Patches

🔴Vulnerability Details

3
CVEList
@tinacms/graphql's Media Endpoints Can Escape the Media Root via Symlinks or Junctions2026-04-01
GHSA
@tinacms/graphql's Media Endpoints Can Escape the Media Root via Symlinks or Junctions2026-04-01
OSV
@tinacms/graphql's Media Endpoints Can Escape the Media Root via Symlinks or Junctions2026-04-01

🕵️Threat Intelligence

1
Wiz
CVE-2026-34603 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-34603 — Path Traversal in Tinacms | cvebase