Vulnerability Description
Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /account/change-password` has no authorization check, allowing any session to overwrite the password hash; the inactive password `auth` row is never removed on migration; and the login endpoint accepts a client-supplied `loginMethod` that bypasses the server's active auth configuration. Together these allow an attacker to set a known password and authenticate as the anonymous admin account created during the multiuser migration. The three weaknesses form a single, sequential exploit chain — none produces privilege escalation on its own. Missing authorization on POST /change-password allows overwriting a password hash, but only matters if there is an orphaned row to target. Orphaned password row persisting after migration provides the target row, but is harmless without the ability to authenticate using it. Client-controlled loginMethod: "password" allows forcing password-based auth, but is useless without a known hash established by step 1. All three must be chained in sequence to achieve the impact. No single weakness independently results in privilege escalation. The single root cause is the missing authorization check on /change-password; the other two are preconditions that make it exploitable. Version 26.4.0 contains a fix.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Actualbudget | Actual | < 26.4.0 |
Related Weaknesses (CWE)
References
- https://actualbudget.org/blog/release-26.4.0Release Notes
- https://github.com/actualbudget/actual/security/advisories/GHSA-prp4-2f49-fcgpExploitMitigationVendor Advisory
- https://github.com/actualbudget/actual/security/advisories/GHSA-prp4-2f49-fcgpExploitMitigationVendor Advisory
FAQ
What is CVE-2026-33318?
CVE-2026-33318 is a vulnerability with a CVSS score of 8.8 (HIGH). Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to Open...
How severe is CVE-2026-33318?
CVE-2026-33318 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33318?
Check the references section above for vendor advisories and patch information. Affected products include: Actualbudget Actual.