Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-24125— Path Traversal in @tinacms/graphql

CVSS 6.3 · Medium EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-24125

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path Traversal in @tinacms/graphql
Source: NVD (National Vulnerability Database)
Vulnerability Description
Tina is a headless content management system. Prior to 2.1.2, TinaCMS allows users to create, update, and delete content documents using relative file paths (relativePath, newRelativePath) via GraphQL mutations. Under certain conditions, these paths are combined with the collection path using path.join() without validating that the resolved path remains within the collection root directory. Because path.join() does not prevent directory traversal, paths containing ../ sequences can escape the intended directory boundary. This vulnerability is fixed in 2.1.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
TinaCMS 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TinaCMS是Tina开源的一个用于 Markdown、MDX 和 JSON 的开源无头 CMS。 TinaCMS 2.1.2之前版本存在路径遍历漏洞,该漏洞源于使用path.join()组合路径时未验证解析后的路径是否保持在集合根目录内,可能导致目录遍历攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
@tinacmsgraphql < 2.1.2 -

II. Public POCs for CVE-2026-24125

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-24125

登录查看更多情报信息。

Same Patch Batch · @tinacms · 2026-03-12 · 4 CVEs total

CVE-2026-287929.7 CRITICALCross-Origin File Exfiltration via CORS Misconfiguration + Path Traversal in TinaCMS
CVE-2026-287938.4 HIGHPath Traversal Leading to Arbitrary File Read, Write and Delete in TinaCMS
CVE-2026-290666.2 MEDIUMArbitrary File Read via Disabled Vite Filesystem Restriction in TinaCMS CLI

IV. Related Vulnerabilities

V. Comments for CVE-2026-24125

No comments yet


Leave a comment