<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-34603 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-34603/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 17:28:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-34603/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tina CMS Path Traversal Vulnerability (CVE-2026-34603)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tina-cms-path-traversal/</link><pubDate>Wed, 01 Apr 2026 17:28:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tina-cms-path-traversal/</guid><description>Tina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.</description><content:encoded><![CDATA[<p>Tina CMS, a headless content management system, is susceptible to a path traversal vulnerability in versions prior to 2.2.2. The vulnerability, identified as CVE-2026-34603, stems from insufficient validation of symlink and junction targets within the <code>@tinacms/cli</code> media routes. Although lexical path-traversal checks were implemented, they only validate the path string without resolving symlinks or junctions. This flaw enables attackers to bypass intended security measures and perform unauthorized file system operations, potentially leading to sensitive data exposure or system compromise. This vulnerability has been addressed in version 2.2.2. Defenders should prioritize upgrading to the patched version to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tina CMS instance running a version prior to 2.2.2.</li>
<li>Attacker crafts a malicious HTTP request targeting a media route.</li>
<li>The crafted request includes a path containing a symlink or junction pointing outside the intended media root directory (e.g., <code>pivot/written-from-media.txt</code>).</li>
<li>Tina CMS validates the path string but fails to resolve the symlink or junction.</li>
<li>The application incorrectly determines that the path is within the allowed media directory.</li>
<li>The application performs file system operations (listing, writing, or deleting) based on the attacker-supplied path.</li>
<li>The file system operation is executed outside the intended media root due to the resolved symlink or junction.</li>
<li>Attacker gains unauthorized access to sensitive files or directories, potentially leading to data exfiltration, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34603 can lead to unauthorized access to sensitive files and directories on the server hosting Tina CMS. An attacker could list, read, write, or delete files outside the intended media root, potentially leading to data exfiltration, website defacement, or even complete system compromise. The impact is particularly significant if the affected server stores sensitive information or is critical to business operations. The number of potential victims is currently unknown, but any organization using vulnerable versions of Tina CMS is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tina CMS to version 2.2.2 or later to patch CVE-2026-34603.</li>
<li>Implement web application firewall (WAF) rules to detect and block suspicious requests containing path traversal sequences targeting media routes.</li>
<li>Monitor web server access logs for unusual file access patterns and path traversal attempts. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>tina-cms</category><category>CVE-2026-34603</category></item></channel></rss>