PT-2026-29157 · Npm · @Tinacms/Graphql
Published
2026-03-30
·
Updated
2026-03-30
·
CVE-2026-33949
CVSS v3.1
8.1
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
Summary
A Path Traversal vulnerability in
@tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root. This is achieved by manipulating the relativePath parameter in GraphQL mutations. The impact includes the ability to replace critical server configuration files and potentially execute arbitrary commands by sabotaging build scripts.Details
The vulnerability exists in the path validation logic within
@tinacms/graphql. Specifically, the regex-based validation in getValidatedPath fails to recognize backslashes (``) as directory separators on non-Windows platforms (Mac/Linux). An attacker can provide a path like x......package.json, which bypasses the validation check but is subsequently treated as a traversal path during file I/O operations by the underlying fs modules and path normalization utilities.Incriminated code areas:
- packages/@tinacms/graphql/src/database/bridge/filesystem.ts: assertWithinBase function.
- packages/@tinacms/graphql/src/resolver/index.ts:
getValidatedPathfunction.
PoC
- Start the TinaCMS development server.
- Send a malicious GraphQL mutation to overwrite a project file (e.g., package.json):
curl -X POST http://localhost:4001/graphql
-H "Content-Type: application/json"
-d '{"query": "mutation { updateDocument(collection: "global", relativePath: "x......package.json", params: { global: { header: { name: "OVERWRITTEN" } } }) { typename } }"}'
- Observe that the root package.json has been replaced with the provided payload.
Impact
This is an Arbitrary File Write vulnerability. Any unauthenticated user with network access to the GraphQL API can:
- Overwrite critical server configuration files (e.g., package.json, tsconfig.json).
- Host malicious scripts in the
public/directory for client-side attacks. - Perform Arbitrary Code Execution by modifying build scripts or server-side logic files that are subsequently executed by the environment.
Weaknesses:
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-73: External Control of File Name or Path
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
@Tinacms/Graphql