Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28792: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in @tinacms cli

0
Critical
VulnerabilityCVE-2026-28792cvecve-2026-28792cwe-22cwe-942
Published: Thu Mar 12 2026 (03/12/2026, 16:48:16 UTC)
Source: CVE Database V5
Vendor/Project: @tinacms
Product: cli

Description

Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply tricking them into visiting a malicious website while tinacms dev is running. This vulnerability is fixed in 2.1.8.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:49:42 UTC

Technical Analysis

CVE-2026-28792 is a critical security vulnerability identified in the @tinacms CLI dev server prior to version 2.1.8. TinaCMS is a headless content management system widely used for managing content in web development environments. The vulnerability stems from a path traversal flaw (CWE-22) combined with an overly permissive Cross-Origin Resource Sharing (CORS) configuration that sets Access-Control-Allow-Origin to '*', effectively allowing any origin to interact with the dev server. This combination enables a remote attacker to perform a browser-based drive-by attack by enticing a developer to visit a malicious website while the vulnerable tinacms dev server is running locally. Exploiting this flaw, the attacker can enumerate the filesystem, write arbitrary files, and delete files on the developer's machine without requiring authentication. The vulnerability impacts the confidentiality, integrity, and availability of the developer's local environment. The scope of the attack is limited to developer machines running the vulnerable CLI dev server, but the impact on those machines can be severe, including potential code tampering or data loss. The vulnerability has been assigned a CVSS v3.1 score of 9.7 (critical), reflecting its ease of exploitation (network vector, no privileges required), high impact on confidentiality, integrity, and availability, and the requirement for only user interaction (visiting a malicious website). The issue was publicly disclosed and fixed in version 2.1.8 of the @tinacms CLI. No known exploits in the wild have been reported yet, but the high severity and ease of exploitation make timely patching essential.

Potential Impact

The impact of CVE-2026-28792 is significant for organizations whose developers use the vulnerable versions of the TinaCMS CLI dev server. Attackers can remotely exploit this vulnerability to gain unauthorized access to the developer's local filesystem, enabling them to read sensitive files, modify source code or configuration files, and delete critical data. This can lead to compromised development environments, introduction of malicious code or backdoors into software projects, and disruption of development workflows. Since the attack requires only that the developer visit a malicious website, it can be executed via phishing or malicious advertising campaigns, increasing the attack surface. Organizations relying on TinaCMS for content management and development may face risks of intellectual property theft, supply chain compromise, and loss of data integrity. The vulnerability also undermines trust in the development environment, potentially delaying releases and increasing remediation costs. Although no active exploits are reported, the critical severity and ease of exploitation necessitate immediate attention to prevent potential widespread abuse.

Mitigation Recommendations

1. Immediate upgrade of the @tinacms CLI to version 2.1.8 or later, where the vulnerability is fixed, is the most effective mitigation. 2. Restrict access to the tinacms dev server by limiting network exposure; avoid running the dev server on publicly accessible interfaces or networks. 3. Implement strict CORS policies that do not use wildcard '*' origins, limiting access to trusted domains only. 4. Educate developers about the risks of visiting untrusted websites while running development servers locally. 5. Use network-level controls such as firewall rules or VPNs to isolate development environments from untrusted networks. 6. Monitor developer machines for unusual filesystem activity that may indicate exploitation attempts. 7. Employ endpoint protection solutions capable of detecting unauthorized file system modifications. 8. Review and audit development environment configurations regularly to ensure no insecure settings persist. 9. Consider containerizing or sandboxing development environments to limit the impact of potential compromises. 10. Maintain an incident response plan that includes steps for handling local development environment compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T14:25:19.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b30a4d2f860ef943dbc486

Added to database: 3/12/2026, 6:47:41 PM

Last enriched: 3/12/2026, 6:49:42 PM

Last updated: 3/13/2026, 11:55:42 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses