Логотип exploitDog
bind:CVE-2026-28793
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-28793

Количество 2

Количество 2

nvd логотип

CVE-2026-28793

28 дней назад

Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory. When running tinacms dev, the CLI starts a local HTTP server (default port 4001) exposing endpoints such as /media/list/*, /media/upload/*, and /media/*. These endpoints process user-controlled path segments using decodeURI() and path.join() without validating that the resolved path remains within the configured media directory. This vulnerability is fixed in 2.1.8.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-2f24-mg4x-534q

28 дней назад

TinaCMS Vulnerable to Path Traversal Leading to Arbitrary File Read, Write and Delete

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-28793

Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory. When running tinacms dev, the CLI starts a local HTTP server (default port 4001) exposing endpoints such as /media/list/*, /media/upload/*, and /media/*. These endpoints process user-controlled path segments using decodeURI() and path.join() without validating that the resolved path remains within the configured media directory. This vulnerability is fixed in 2.1.8.

CVSS3: 8.4
0%
Низкий
28 дней назад
github логотип
GHSA-2f24-mg4x-534q

TinaCMS Vulnerable to Path Traversal Leading to Arbitrary File Read, Write and Delete

CVSS3: 8.4
0%
Низкий
28 дней назад

Уязвимостей на страницу