High severity8.1NVD Advisory· Published Apr 1, 2026· Updated Apr 7, 2026
CVE-2026-33949
CVE-2026-33949
Description
Tina is a headless content management system. Prior to version 2.2.2, a path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root. This is achieved by manipulating the relativePath parameter in GraphQL mutations. The impact includes the ability to replace critical server configuration files and potentially execute arbitrary commands by sabotaging build script. This issue has been patched in version 2.2.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@tinacms/graphqlnpm | < 2.2.2 | 2.2.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-v9p7-gf3q-h779ghsaADVISORY
- github.com/tinacms/tinacms/security/advisories/GHSA-v9p7-gf3q-h779nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-33949ghsaADVISORY
News mentions
0No linked articles in our index yet.