Home

Description

Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0.

PUBLISHED Reserved 2026-02-24 | Published 2026-03-09 | Updated 2026-03-09 | Assigner Fluid Attacks




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

26.2.1
affected

Credits

Juan Patarroyo finder

References

fluidattacks.com/advisories/fugue exploit

fluidattacks.com/advisories/fugue third-party-advisory

github.com/actualbudget/actual product

github.com/actualbudget/actual/pull/7067 patch

cve.org (CVE-2026-3089)

nvd.nist.gov (CVE-2026-3089)

Download JSON