{"uuid": "0336ffa8-d502-484e-bd80-a497ec5b9d45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-25164", "type": "seen", "source": "https://t.me/cibsecurity/57801", "content": "\u203c CVE-2023-25164 \u203c\n\nTinacms is a Git-backed headless content management system with support for visual editing. Sites being built with @tinacms/cli &gt;= 1.0.0 &amp;&amp; &lt; 1.0.9 which store sensitive values in the process.env variable are impacted. These values will be added in plaintext to the index.js file. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If you are affected and your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. This issue has been patched in @tinacms/cli@1.0.9. Users are advised to upgrade. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-08T22:25:33.000000Z"}