Description

Tina is a headless content management system. Prior to version 2.2.2, @tinacms/cli recently added lexical path-traversal checks to the dev media routes, but the implementation still validates only the path string and does not resolve symlink or junction targets. If a link already exists under the media root, Tina accepts a path like pivot/written-from-media.txt as "inside" the media directory and then performs real filesystem operations through that link target. This allows out-of-root media listing and write access, and the same root cause also affects delete. This issue has been patched in version 2.2.2.

INFO

Published Date :

2026-04-01T16:08:44.366Z

Last Modified :

2026-04-01T17:54:25.006Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-34603 vulnerability.

Vendors Products
Ssw
  • Tinacms\/cli
Tina
  • Tinacms
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34603.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact