Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29066: CWE-552: Files or Directories Accessible to External Parties in @tinacms cli

0
Medium
VulnerabilityCVE-2026-29066cvecve-2026-29066cwe-552cwe-200
Published: Thu Mar 12 2026 (03/12/2026, 16:57:41 UTC)
Source: CVE Database V5
Vendor/Project: @tinacms
Product: cli

Description

CVE-2026-29066 is a medium-severity vulnerability in the @tinacms CLI dev server prior to version 2. 1. 8. The issue arises because the dev server configures Vite with server. fs. strict set to false, disabling filesystem access restrictions. This misconfiguration allows unauthenticated attackers who can reach the dev server to read arbitrary files on the host system, potentially exposing sensitive information. The vulnerability does not require authentication or user interaction but requires network access to the dev server. It impacts confidentiality but not integrity or availability. The issue is fixed in version 2.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:50:20 UTC

Technical Analysis

CVE-2026-29066 affects the @tinacms CLI, a tool used in the TinaCMS headless content management system, specifically versions prior to 2.1.8. The vulnerability stems from the dev server's configuration of Vite, a frontend build tool, where the server.fs.strict option is set to false. This setting disables Vite's built-in filesystem access restrictions, which normally prevent unauthorized access to files outside the intended directories. As a result, any unauthenticated attacker who can reach the development server can exploit this misconfiguration to read arbitrary files on the host system. This can lead to exposure of sensitive data such as configuration files, source code, credentials, or other private information stored on the server. The vulnerability is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-200 (Information Exposure). The CVSS v3.1 base score is 6.2, reflecting medium severity, with an attack vector limited to local network or VPN (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild as of the publication date. The issue is resolved in TinaCMS CLI version 2.1.8 by re-enabling strict filesystem access restrictions in Vite's configuration.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers gaining access to configuration files, environment variables, or source code can leverage this information for further attacks, including credential theft, privilege escalation, or lateral movement within an organization’s network. Since the vulnerability does not affect integrity or availability, it does not directly enable data modification or service disruption. However, the confidentiality breach can have significant consequences, especially if sensitive credentials or proprietary code are exposed. Organizations using TinaCMS CLI in development environments accessible over networks are at risk. The attack requires network access to the dev server, which is often restricted but may be exposed in some setups, increasing risk. The vulnerability could facilitate subsequent attacks or data breaches if exploited.

Mitigation Recommendations

The primary mitigation is to upgrade the @tinacms CLI to version 2.1.8 or later, where the vulnerability is fixed by enabling Vite's strict filesystem access restrictions. Until upgrading, organizations should ensure that the TinaCMS dev server is not exposed to untrusted networks or the internet. Network-level controls such as firewall rules, VPNs, or access control lists should restrict access to the development environment. Additionally, developers should avoid running the dev server on publicly accessible interfaces. Implementing environment segmentation and least privilege principles can limit exposure. Monitoring and logging access to development servers can help detect suspicious activity. Regularly auditing configurations of development tools to ensure secure defaults is recommended. Finally, educating developers about the risks of exposing dev servers and proper configuration management will reduce future risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T20:51:43.482Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b30a4f2f860ef943dbd356

Added to database: 3/12/2026, 6:47:43 PM

Last enriched: 3/12/2026, 6:50:20 PM

Last updated: 3/13/2026, 9:48:16 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses