Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0.
History

Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Description Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0.
Title Actual Sync Server 26.2.1 - Authenticated Path Traversal
First Time appeared Actual
Actual actual Sync Server
Weaknesses CWE-22
CPEs cpe:2.3:a:actual:actual_sync_server:26.2.1:*:linux:*:*:*:*:*
cpe:2.3:a:actual:actual_sync_server:26.2.1:*:macos:*:*:*:*:*
cpe:2.3:a:actual:actual_sync_server:26.2.1:*:windows:*:*:*:*:*
Vendors & Products Actual
Actual actual Sync Server
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2026-03-09T14:54:24.136Z

Reserved: 2026-02-24T00:49:14.624Z

Link: CVE-2026-3089

cve-icon Vulnrichment

Updated: 2026-03-09T14:54:14.217Z

cve-icon NVD

Status : Received

Published: 2026-03-09T14:16:10.143

Modified: 2026-03-09T15:15:58.220

Link: CVE-2026-3089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.