CVE-2026-34603 in Tina CMS
Zusammenfassung (Englisch)
Tina is a headless content management system. Prior to version 2.2.2, @tinacms/cli recently added lexical path-traversal checks to the dev media routes, but the implementation still validates only the path string and does not resolve symlink or junction targets. If a link already exists under the media root, Tina accepts a path like pivot/written-from-media.txt as "inside" the media directory and then performs real filesystem operations through that link target. This allows out-of-root media listing and write access, and the same root cause also affects delete. This issue has been patched in version 2.2.2.
Zuständig
GitHub_M
Reservieren
30.03.2026
Veröffentlichung
01.04.2026
Einträge
VulDB provides additional information and datapoints for this CVE:
| ID | Schwachstelle | CWE | Aus | Mas | CVE |
|---|---|---|---|---|---|
| 354710 | Tina CMS Directory Traversal | 22 | Nicht definiert | Offizieller Fix | CVE-2026-34603 |