Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply tricking them into visiting a malicious website while tinacms dev is running. This vulnerability is fixed in 2.1.8.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ssw
Ssw tinacms\/cli |
|
| CPEs | cpe:2.3:a:ssw:tinacms\/cli:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Ssw
Ssw tinacms\/cli |
Fri, 13 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tina
Tina tinacms |
|
| Vendors & Products |
Tina
Tina tinacms |
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply tricking them into visiting a malicious website while tinacms dev is running. This vulnerability is fixed in 2.1.8. | |
| Title | Cross-Origin File Exfiltration via CORS Misconfiguration + Path Traversal in TinaCMS | |
| Weaknesses | CWE-22 CWE-942 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-12T16:48:16.461Z
Updated: 2026-03-13T16:29:06.236Z
Reserved: 2026-03-03T14:25:19.245Z
Link: CVE-2026-28792
Updated: 2026-03-13T16:28:55.395Z
Status : Modified
Published: 2026-03-12T17:16:50.387
Modified: 2026-03-13T19:54:32.090
Link: CVE-2026-28792
No data.