CVE-2025-68278
Published: 18 December 2025
Description
Tina is a headless content management system. In tinacms prior to version 3.1.1, tinacms uses the gray-matter package in an insecure way allowing attackers that can control the content of the processed markdown files, e.g., blog posts, to execute arbitrary…
more
code. tinacms version 3.1.1, @tinacms/cli version 2.0.4, and @tinacms/graphql version 2.0.3 contain a fix for the issue.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the code injection flaw in tinacms's insecure gray-matter usage by requiring timely patching to version 3.1.1 or later.
Validates user-controlled Markdown file content, such as blog posts, prior to processing to block malicious code injection via gray-matter.
Implements memory protections like DEP and ASLR to mitigate arbitrary code execution even if malicious Markdown content is processed.
Security SummaryAI
CVE-2025-68278 is a code injection vulnerability (CWE-94) in Tina, a headless content management system, specifically affecting the tinacms package prior to version 3.1.1. The issue arises from insecure usage of the gray-matter package when processing Markdown files, such as blog posts, enabling arbitrary code execution if attackers control the file content. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-12-18.
Attackers who can control the content of Markdown files processed by tinacms, such as through user-submitted blog posts, can exploit this vulnerability to execute arbitrary code on the system running the CMS. Exploitation requires no privileges (PR:N) and is network-accessible (AV:N) with low complexity (AC:L), but depends on user interaction (UI:R), such as a site administrator previewing or editing the malicious file. Successful attacks result in high impacts to confidentiality, integrity, and availability.
Mitigation is available via patches released in tinacms version 3.1.1, @tinacms/cli version 2.0.4, and @tinacms/graphql version 2.0.3, as detailed in the GitHub security advisory (GHSA-529f-9qwm-9628) and the fixing commit (fa7c27abef968e3f3a3e7d564f282bc566087569). Security practitioners should upgrade affected installations immediately to prevent exploitation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Code injection vulnerability in public-facing headless CMS enables arbitrary remote code execution via attacker-controlled Markdown files, directly facilitating T1190 (Exploit Public-Facing Application).