Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywhere on the server filesystem. The GET /sync/upload_finished endpoint allows an unauthenticated attacker to list arbitrary directory contents and read specific JSON files. This vulnerability is fixed in 1.4.5, 1.5.5, and 1.6.0-beta.4.
References
| Link | Resource |
|---|---|
| https://github.com/saltcorn/saltcorn/security/advisories/GHSA-32pv-mpqg-h292 | Exploit Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Apr 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha10:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha7:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha11:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha12:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha8:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha14:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha15:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha9:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha13:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:*:*:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha17:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha0:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta2:*:*:*:node.js:*:* |
cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha9:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha8:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha14:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha6:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha13:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha10:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta1:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha11:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha3:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha0:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:*:*:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha16:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta2:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha7:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha2:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha1:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha12:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha5:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha15:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha4:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta3:*:*:*:*:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha17:*:*:*:*:*:* |
27 Apr 2026, 13:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/saltcorn/saltcorn/security/advisories/GHSA-32pv-mpqg-h292 - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Saltcorn saltcorn
Saltcorn |
|
| CPE | cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha14:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha16:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha15:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha10:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha9:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha13:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:*:*:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha17:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha7:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha11:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha0:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha12:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:saltcorn:saltcorn:1.6.0:alpha8:*:*:*:node.js:*:* |
10 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 18:16
Updated : 2026-04-27 13:36
NVD link : CVE-2026-40163
Mitre link : CVE-2026-40163
CVE.ORG link : CVE-2026-40163
JSON object : View
Products Affected
saltcorn
- saltcorn
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
