CVE-2026-40163

HIGH

Saltcorn has an Unauthenticated Path Traversal in sync endpoints allows arbitrary file write and directory read

Title source: cna
STIX 2.1

Description

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywhere on the server filesystem. The GET /sync/upload_finished endpoint allows an unauthenticated attacker to list arbitrary directory contents and read specific JSON files. This vulnerability is fixed in 1.4.5, 1.5.5, and 1.6.0-beta.4.

Scores

CVSS v3 8.2
EPSS 0.0012
EPSS Percentile 30.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (5)
saltcorn/saltcorn 1.6.0 alpha0 (21 CPE variants)
saltcorn/saltcorn < 1.4.5 (2 CPE variants)
saltcorn/saltcorn >= 1.5.0-beta.0, < 1.5.5
saltcorn/saltcorn >= 1.6.0-alpha.0, < 1.6.0-beta.4
saltcorn/server 0 - 1.4.5npm
Published Apr 10, 2026
Tracked Since Apr 10, 2026