VYPR
High severityNVD Advisory· Published Mar 12, 2026· Updated Mar 13, 2026

Path Traversal in Media Upload Handle in Tina

CVE-2026-28791

Description

Tina is a headless content management system. Prior to 2.1.7, a path traversal vulnerability exists in the TinaCMS development server's media upload handler. The code at media.ts joins user-controlled path segments using path.join() without validating that the resulting path stays within the intended media directory. This allows writing files to arbitrary locations on the filesystem. This vulnerability is fixed in 2.1.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal in TinaCMS's media upload handler lets unauthenticated attackers write files outside the intended directory, fixed in version 2.1.7.

A path traversal vulnerability, identified as CWE-22, exists in the TinaCMS development server's media upload handler. The vulnerable code in media.ts at lines 42-43 takes a user-controlled path from the URL, splits it on slashes, and passes it to path.join() without validating that the resulting path remains within the intended mediaFolder directory [1][2]. Because path.join() resolves .. segments, an attacker can supply a path like ../../../tmp/evil.txt to escape the media directory and write folder and write files anywhere on the filesystem [1].

The attack is exploitable over the network via an HTTP POST request to the /media/upload/ endpoint. No authentication is required, special privileges, or prior access is required; the development server is directly reachable [1]. The same traversal pattern also affects the delete handler may also be affected, allowing arbitrary file deletion [1].

Successful exploitation grants the attacker arbitrary file write capability. This can be leveraged to overwrite critical system files, inject malicious scripts, or achieve remote code execution on the server running the TinaCMS development server [1][2]. The impact is rated as critical due to the low attack complexity and high potential for full system compromise [2].

The vulnerability is patched in TinaCMS version 2.1.7 [1][2]. Users are strongly advised to upgrade immediately. No known workarounds are provided; disabling the media endpoint on untrusted networks is a temporary mitigation [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tinacmsnpm
< 2.1.72.1.7

Affected products

2
  • tinacms/Tinallm-fuzzy
    Range: <2.1.7
  • tinacms/tinacmsv5
    Range: < 2.1.7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.