Vulnerability Description
Tina is a headless content management system. Prior to version 2.2.2, @tinacms/graphql uses string-based path containment checks in FilesystemBridge. That blocks plain ../ traversal, but it does not resolve symlink or junction targets. If a symlink/junction already exists under the allowed content root, a path like content/posts/pivot/owned.md is still considered "inside" the base even though the real filesystem target can be outside it. As a result, FilesystemBridge.get(), put(), delete(), and glob() can operate on files outside the intended root. This issue has been patched in version 2.2.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ssw | Tinacms\/Graphql | <= 2.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/tinacms/tinacms/commit/f124eabaca10dac9a4d765c9e4135813c48309Patch
- https://github.com/tinacms/tinacms/security/advisories/GHSA-g9c2-gf25-3x67Vendor Advisory
- https://github.com/tinacms/tinacms/security/advisories/GHSA-g9c2-gf25-3x67Vendor Advisory
FAQ
What is CVE-2026-34604?
CVE-2026-34604 is a vulnerability with a CVSS score of 7.1 (HIGH). Tina is a headless content management system. Prior to version 2.2.2, @tinacms/graphql uses string-based path containment checks in FilesystemBridge. That blocks plain ../ traversal, but it does not r...
How severe is CVE-2026-34604?
CVE-2026-34604 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34604?
Check the references section above for vendor advisories and patch information. Affected products include: Ssw Tinacms\/Graphql.