Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-27vg-33gh-4hwg | Actual Sync Server has an Authenticated Path Traversal |
Thu, 09 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actualbudget
Actualbudget actual |
|
| CPEs | cpe:2.3:a:actualbudget:actual:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Actualbudget
Actualbudget actual |
|
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0. | |
| Title | Actual Sync Server 26.2.1 - Authenticated Path Traversal | |
| First Time appeared |
Actual
Actual actual Sync Server |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:actual:actual_sync_server:26.2.1:*:linux:*:*:*:*:* cpe:2.3:a:actual:actual_sync_server:26.2.1:*:macos:*:*:*:*:* cpe:2.3:a:actual:actual_sync_server:26.2.1:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Actual
Actual actual Sync Server |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2026-03-09T14:54:24.136Z
Reserved: 2026-02-24T00:49:14.624Z
Link: CVE-2026-3089
Updated: 2026-03-09T14:54:14.217Z
Status : Analyzed
Published: 2026-03-09T14:16:10.143
Modified: 2026-04-09T21:01:46.087
Link: CVE-2026-3089
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:00:11Z
Github GHSA