Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0. | |
| Title | Actual Sync Server 26.2.1 - Authenticated Path Traversal | |
| First Time appeared |
Actual
Actual actual Sync Server |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:actual:actual_sync_server:26.2.1:*:linux:*:*:*:*:* cpe:2.3:a:actual:actual_sync_server:26.2.1:*:macos:*:*:*:*:* cpe:2.3:a:actual:actual_sync_server:26.2.1:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Actual
Actual actual Sync Server |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2026-03-09T14:54:24.136Z
Reserved: 2026-02-24T00:49:14.624Z
Link: CVE-2026-3089
Updated: 2026-03-09T14:54:14.217Z
Status : Received
Published: 2026-03-09T14:16:10.143
Modified: 2026-03-09T15:15:58.220
Link: CVE-2026-3089
No data.
OpenCVE Enrichment
No data.