Cyber Posture

CVE-2025-68278

HighPublic PoC

Published: 18 December 2025

Published
18 December 2025
Modified
10 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Tina is a headless content management system. In tinacms prior to version 3.1.1, tinacms uses the gray-matter package in an insecure way allowing attackers that can control the content of the processed markdown files, e.g., blog posts, to execute arbitrary…

more

code. tinacms version 3.1.1, @tinacms/cli version 2.0.4, and @tinacms/graphql version 2.0.3 contain a fix for the issue.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the code injection flaw in tinacms's insecure gray-matter usage by requiring timely patching to version 3.1.1 or later.

prevent

Validates user-controlled Markdown file content, such as blog posts, prior to processing to block malicious code injection via gray-matter.

prevent

Implements memory protections like DEP and ASLR to mitigate arbitrary code execution even if malicious Markdown content is processed.

Security SummaryAI

CVE-2025-68278 is a code injection vulnerability (CWE-94) in Tina, a headless content management system, specifically affecting the tinacms package prior to version 3.1.1. The issue arises from insecure usage of the gray-matter package when processing Markdown files, such as blog posts, enabling arbitrary code execution if attackers control the file content. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-12-18.

Attackers who can control the content of Markdown files processed by tinacms, such as through user-submitted blog posts, can exploit this vulnerability to execute arbitrary code on the system running the CMS. Exploitation requires no privileges (PR:N) and is network-accessible (AV:N) with low complexity (AC:L), but depends on user interaction (UI:R), such as a site administrator previewing or editing the malicious file. Successful attacks result in high impacts to confidentiality, integrity, and availability.

Mitigation is available via patches released in tinacms version 3.1.1, @tinacms/cli version 2.0.4, and @tinacms/graphql version 2.0.3, as detailed in the GitHub security advisory (GHSA-529f-9qwm-9628) and the fixing commit (fa7c27abef968e3f3a3e7d564f282bc566087569). Security practitioners should upgrade affected installations immediately to prevent exploitation.

Details

CWE(s)

Affected Products

ssw
tinacms
≤ 3.1.1
ssw
tinacms\/cli
≤ 2.0.4
ssw
tinacms\/graphql
≤ 2.0.3

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Code injection vulnerability in public-facing headless CMS enables arbitrary remote code execution via attacker-controlled Markdown files, directly facilitating T1190 (Exploit Public-Facing Application).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References