CVE-2023-25164 – @tinacms/cli
Package
Manager: npm
Name: @tinacms/cli
Vulnerable Version: >=1.0.0 <1.0.9
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00262 pctl0.49329
Details
Sensitive Information leak via Script File in TinaCMS ### Impact Sensitive Information leaked via script File in TinaCMS. Sites building with @tinacms/cli >= 1.0.0 && < 1.0.9 that store sensitive values in process.env var are impacted. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. ### Patches This issue has been patched in @tinacms/cli@1.0.9 ### Workarounds Upgrading, and rotating secure & exposed keys is required for the proper fix. ### References https://github.com/tinacms/tinacms/pull/3584
Metadata
Created: 2023-02-08T18:18:05Z
Modified: 2023-02-08T22:40:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-pc2q-jcxq-rjrr/GHSA-pc2q-jcxq-rjrr.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-pc2q-jcxq-rjrr
Finding: F017
Auto approve: 1