Tina is a headless content management system. Prior to 2.1.7, a path traversal vulnerability exists in the TinaCMS development server's media upload handler. The code at media.ts joins user-controlled path segments using path.join() without validating that the resulting path stays within the intended media directory. This allows writing files to arbitrary locations on the filesystem. This vulnerability is fixed in 2.1.7.
History

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description Tina is a headless content management system. Prior to 2.1.7, a path traversal vulnerability exists in the TinaCMS development server's media upload handler. The code at media.ts joins user-controlled path segments using path.join() without validating that the resulting path stays within the intended media directory. This allows writing files to arbitrary locations on the filesystem. This vulnerability is fixed in 2.1.7.
Title Path Traversal in Media Upload Handle in Tina
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-03-12T16:55:47.528Z

Updated: 2026-03-12T16:55:47.528Z

Reserved: 2026-03-03T14:25:19.244Z

Link: CVE-2026-28791

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-12T17:16:50.237

Modified: 2026-03-12T17:16:50.237

Link: CVE-2026-28791

cve-icon Redhat

No data.