CVE-2026-28792

TinaCMS · TinaCMS CLI

TinaCMS CLI is vulnerable to a browser-based drive-by attack that allows remote attackers to read, write, or delete files on developer machines.

Executive summary

A critical vulnerability in the TinaCMS CLI dev server allows remote attackers to perform filesystem operations on developer machines via a browser-based drive-by attack.

Vulnerability

The vulnerability combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with a path traversal flaw. An unauthenticated remote attacker can trick a developer into visiting a malicious website, which then uses the developer's browser to execute commands against the locally running tinacms dev server.

Business impact

With a CVSS score of 9.6, this vulnerability poses a severe threat to developer workstations. Attackers can enumerate the filesystem, steal sensitive source code, or delete critical project files. This could lead to a supply chain compromise if an attacker manages to inject malicious code into the project via the CLI.

Remediation

Immediate Action: Update the TinaCMS CLI to version 2.1.8 or later immediately to resolve the CORS and path traversal issues.

Proactive Monitoring: Encourage developers to monitor for unexpected file changes in their project directories while the dev server is active.

Compensating Controls: Restrict the tinacms dev server to bind only to the local loopback interface (127.0.0.1) and avoid browsing untrusted websites while the dev server is running.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Developers must update to version 2.1.8 immediately. Because this vulnerability targets the development environment, it is a significant risk to the integrity of the software development lifecycle. Immediate patching is the only effective mitigation.