Vulnerability Description
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywhere on the server filesystem. The GET /sync/upload_finished endpoint allows an unauthenticated attacker to list arbitrary directory contents and read specific JSON files. This vulnerability is fixed in 1.4.5, 1.5.5, and 1.6.0-beta.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Saltcorn | Saltcorn | < 1.4.5 |
Related Weaknesses (CWE)
References
- https://github.com/saltcorn/saltcorn/security/advisories/GHSA-32pv-mpqg-h292ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-40163?
CVE-2026-40163 is a vulnerability with a CVSS score of 8.2 (HIGH). Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to cre...
How severe is CVE-2026-40163?
CVE-2026-40163 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40163?
Check the references section above for vendor advisories and patch information. Affected products include: Saltcorn Saltcorn.