CVE-2026-40163
HIGHSaltcorn has an Unauthenticated Path Traversal in sync endpoints allows arbitrary file write and directory read
Title source: cnaDescription
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywhere on the server filesystem. The GET /sync/upload_finished endpoint allows an unauthenticated attacker to list arbitrary directory contents and read specific JSON files. This vulnerability is fixed in 1.4.5, 1.5.5, and 1.6.0-beta.4.
Scores
CVSS v3
8.2
EPSS
0.0012
EPSS Percentile
30.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (5)
saltcorn/saltcorn
1.6.0 alpha0 (21 CPE variants)
saltcorn/saltcorn
< 1.4.5 (2 CPE variants)
saltcorn/saltcorn
>= 1.5.0-beta.0, < 1.5.5
saltcorn/saltcorn
>= 1.6.0-alpha.0, < 1.6.0-beta.4
saltcorn/server
0 - 1.4.5npm
Published
Apr 10, 2026
Tracked Since
Apr 10, 2026