CVE-2026-29066: CWE-552: Files or Directories Accessible to External Parties in @tinacms cli
CVE-2026-29066 is a medium-severity vulnerability in the @tinacms CLI dev server prior to version 2. 1. 8. The issue arises because the dev server configures Vite with server. fs. strict set to false, disabling filesystem access restrictions. This misconfiguration allows unauthenticated attackers who can reach the dev server to read arbitrary files on the host system, potentially exposing sensitive information. The vulnerability does not require authentication or user interaction but requires network access to the dev server. It impacts confidentiality but not integrity or availability. The issue is fixed in version 2.
AI Analysis
Technical Summary
CVE-2026-29066 affects the @tinacms CLI, a tool used in the TinaCMS headless content management system, specifically versions prior to 2.1.8. The vulnerability stems from the dev server's configuration of Vite, a frontend build tool, where the server.fs.strict option is set to false. This setting disables Vite's built-in filesystem access restrictions, which normally prevent unauthorized access to files outside the intended directories. As a result, any unauthenticated attacker who can reach the development server can exploit this misconfiguration to read arbitrary files on the host system. This can lead to exposure of sensitive data such as configuration files, source code, credentials, or other private information stored on the server. The vulnerability is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-200 (Information Exposure). The CVSS v3.1 base score is 6.2, reflecting medium severity, with an attack vector limited to local network or VPN (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild as of the publication date. The issue is resolved in TinaCMS CLI version 2.1.8 by re-enabling strict filesystem access restrictions in Vite's configuration.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers gaining access to configuration files, environment variables, or source code can leverage this information for further attacks, including credential theft, privilege escalation, or lateral movement within an organization’s network. Since the vulnerability does not affect integrity or availability, it does not directly enable data modification or service disruption. However, the confidentiality breach can have significant consequences, especially if sensitive credentials or proprietary code are exposed. Organizations using TinaCMS CLI in development environments accessible over networks are at risk. The attack requires network access to the dev server, which is often restricted but may be exposed in some setups, increasing risk. The vulnerability could facilitate subsequent attacks or data breaches if exploited.
Mitigation Recommendations
The primary mitigation is to upgrade the @tinacms CLI to version 2.1.8 or later, where the vulnerability is fixed by enabling Vite's strict filesystem access restrictions. Until upgrading, organizations should ensure that the TinaCMS dev server is not exposed to untrusted networks or the internet. Network-level controls such as firewall rules, VPNs, or access control lists should restrict access to the development environment. Additionally, developers should avoid running the dev server on publicly accessible interfaces. Implementing environment segmentation and least privilege principles can limit exposure. Monitoring and logging access to development servers can help detect suspicious activity. Regularly auditing configurations of development tools to ensure secure defaults is recommended. Finally, educating developers about the risks of exposing dev servers and proper configuration management will reduce future risks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, India, Japan, South Korea
CVE-2026-29066: CWE-552: Files or Directories Accessible to External Parties in @tinacms cli
Description
CVE-2026-29066 is a medium-severity vulnerability in the @tinacms CLI dev server prior to version 2. 1. 8. The issue arises because the dev server configures Vite with server. fs. strict set to false, disabling filesystem access restrictions. This misconfiguration allows unauthenticated attackers who can reach the dev server to read arbitrary files on the host system, potentially exposing sensitive information. The vulnerability does not require authentication or user interaction but requires network access to the dev server. It impacts confidentiality but not integrity or availability. The issue is fixed in version 2.
AI-Powered Analysis
Technical Analysis
CVE-2026-29066 affects the @tinacms CLI, a tool used in the TinaCMS headless content management system, specifically versions prior to 2.1.8. The vulnerability stems from the dev server's configuration of Vite, a frontend build tool, where the server.fs.strict option is set to false. This setting disables Vite's built-in filesystem access restrictions, which normally prevent unauthorized access to files outside the intended directories. As a result, any unauthenticated attacker who can reach the development server can exploit this misconfiguration to read arbitrary files on the host system. This can lead to exposure of sensitive data such as configuration files, source code, credentials, or other private information stored on the server. The vulnerability is classified under CWE-552 (Files or Directories Accessible to External Parties) and CWE-200 (Information Exposure). The CVSS v3.1 base score is 6.2, reflecting medium severity, with an attack vector limited to local network or VPN (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild as of the publication date. The issue is resolved in TinaCMS CLI version 2.1.8 by re-enabling strict filesystem access restrictions in Vite's configuration.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers gaining access to configuration files, environment variables, or source code can leverage this information for further attacks, including credential theft, privilege escalation, or lateral movement within an organization’s network. Since the vulnerability does not affect integrity or availability, it does not directly enable data modification or service disruption. However, the confidentiality breach can have significant consequences, especially if sensitive credentials or proprietary code are exposed. Organizations using TinaCMS CLI in development environments accessible over networks are at risk. The attack requires network access to the dev server, which is often restricted but may be exposed in some setups, increasing risk. The vulnerability could facilitate subsequent attacks or data breaches if exploited.
Mitigation Recommendations
The primary mitigation is to upgrade the @tinacms CLI to version 2.1.8 or later, where the vulnerability is fixed by enabling Vite's strict filesystem access restrictions. Until upgrading, organizations should ensure that the TinaCMS dev server is not exposed to untrusted networks or the internet. Network-level controls such as firewall rules, VPNs, or access control lists should restrict access to the development environment. Additionally, developers should avoid running the dev server on publicly accessible interfaces. Implementing environment segmentation and least privilege principles can limit exposure. Monitoring and logging access to development servers can help detect suspicious activity. Regularly auditing configurations of development tools to ensure secure defaults is recommended. Finally, educating developers about the risks of exposing dev servers and proper configuration management will reduce future risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-03T20:51:43.482Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b30a4f2f860ef943dbd356
Added to database: 3/12/2026, 6:47:43 PM
Last enriched: 3/12/2026, 6:50:20 PM
Last updated: 3/13/2026, 9:48:16 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.