Tina CVE-2024-45391
HIGHCVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
3DescriptionNVD
Tina is an open-source content management system (CMS). Sites building with Tina CMS's command line interface (CLI) prior to version 1.6.2 that use a search token may be vulnerable to the search token being leaked via lock file (tina-lock.json). Administrators of Tina-enabled websites with search setup should rotate their key immediately. This issue has been patched in @tinacms/cli version 1.6.2. Upgrading and rotating the search token is required for the proper fix.
AnalysisAI
High-severity information disclosure vulnerability in Tina CMS's CLI tool (versions before 1.6.2) that exposes search tokens in the tina-lock.json file, allowing unauthorized access to sensitive authentication credentials. Attackers can exploit this remotely without authentication to steal search tokens from affected websites. With an EPSS score of 0.25%, real-world exploitation likelihood is relatively low despite the high CVSS score.
Technical ContextAI
The vulnerability affects the @tinacms/cli package for Node.js (CPE: cpe:2.3:a:ssw:tinacms\/cli:*:*:*:*:*:node.js:*:*), specifically versions prior to 1.6.2. This is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), where the CLI tool inadvertently writes search authentication tokens to the tina-lock.json file during the build process. Lock files are typically committed to version control systems, making the exposed tokens accessible to anyone with repository access or if the repository is public.
RemediationAI
Immediate actions required: 1) Upgrade @tinacms/cli to version 1.6.2 or later (patch commit: https://github.com/tinacms/tinacms/commit/110f1ceea4574d636a64526648f7c8bf6539b26a), 2) Rotate all search tokens immediately after upgrading, 3) Review and remove any tina-lock.json files from public repositories or version control history that may contain exposed tokens. The vendor security advisory (https://github.com/tinacms/tinacms/security/advisories/GHSA-4qrm-9h4r-v2fx) provides additional guidance. No workarounds are available; patching and token rotation are mandatory.
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-4qrm-9h4r-v2fx