CVE-2026-33949
🟡 Monitoruj
W podatnym Tina CMS umożliwia atakującym zapis i nadpisywanie plików w projekcie.
CVSS
8.1
EPSS
0.1%
Exploit
none
Vendor
ssw
Opis źródłowy (NVD)
Tina is a headless content management system. Prior to version 2.2.2, a path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root. This is achieved by manipulating the relativePath parameter in GraphQL mutations. The impact includes the ability to replace critical server configuration files and potentially execute arbitrary commands by sabotaging build script. This issue has been patched in version 2.2.2.
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-01 17:28:39 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-07 19:17:35 UTC |
Referencje
- https://github.com/tinacms/tinacms/security/advisories/GHSA-v9p7-gf3q-h779 (security-advisories@github.com) [Vendor Advisory]