Description
Tina is a headless content management system. Prior to version 2.2.2, @tinacms/cli recently added lexical path-traversal checks to the dev media routes, but the implementation still validates only the path string and does not resolve symlink or junction targets. If a link already exists under the media root, Tina accepts a path like pivot/written-from-media.txt as "inside" the media directory and then performs real filesystem operations through that link target. This allows out-of-root media listing and write access, and the same root cause also affects delete. This issue has been patched in version 2.2.2.
INFO
Published Date :
2026-04-01T16:08:44.366Z
Last Modified :
2026-04-01T17:54:25.006Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-34603 vulnerability.
| Vendors | Products |
|---|---|
| Ssw |
|
| Tina |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34603.