Lucene search

K
nvd[email protected]NVD:CVE-2023-25164
HistoryFeb 08, 2023 - 8:15 p.m.

CVE-2023-25164

2023-02-0820:15:24
CWE-200
CWE-532
web.nvd.nist.gov
3
tinacms
vulnerability
process.env
plaintext
sensitive values
index.js
@tinacms/cli
patch
upgrade

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

53.0%

Tinacms is a Git-backed headless content management system with support for visual editing. Sites being built with @tinacms/cli >= 1.0.0 && < 1.0.9 which store sensitive values in the process.env variable are impacted. These values will be added in plaintext to the index.js file. If you’re on a version prior to 1.0.0 this vulnerability does not affect you. If you are affected and your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. This issue has been patched in @tinacms/[email protected]. Users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

Nvd
Node
tinatinacmsRange1.0.01.0.9node.js
VendorProductVersionCPE
tinatinacms*cpe:2.3:a:tina:tinacms:*:*:*:*:*:node.js:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

53.0%