Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

TinaCMS GraphQL allows malicious file creation and deletion

CVE-2026-24125 GHSA-2238-xc5r-v9hj
Summary

An authenticated user can create, move, or delete files outside the intended directory using TinaCMS's GraphQL API. This can lead to unintended data exposure or tampering. To fix this, ensure you're using the latest version of TinaCMS and consider restricting permissions to prevent users from accessing sensitive areas.

What to do
  • Update tinacms graphql to version 2.1.2.
Affected software
VendorProductAffected versionsFix available
tinacms graphql <= 2.1.1 2.1.2
ssw tinacms\/graphql <= 2.1.2 –
Original title
Tina is a headless content management system. Prior to 2.1.2, TinaCMS allows users to create, update, and delete content documents using relative file paths (relativePath, newRelativePath) via Grap...
Original description
Tina is a headless content management system. Prior to 2.1.2, TinaCMS allows users to create, update, and delete content documents using relative file paths (relativePath, newRelativePath) via GraphQL mutations. Under certain conditions, these paths are combined with the collection path using path.join() without validating that the resolved path remains within the collection root directory. Because path.join() does not prevent directory traversal, paths containing ../ sequences can escape the intended directory boundary. This vulnerability is fixed in 2.1.2.
nvd CVSS3.1 6.3
Vulnerability type
CWE-22 Path Traversal
Published: 12 Mar 2026 · Updated: 13 Mar 2026 · First seen: 12 Mar 2026