Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @actual-app/sync-server
  4. ›
  5. CVE-2026-33318

CVE-2026-33318: Actual has Privilege Escalation via 'change-password' Endpoint on OpenID-Migrated Servers

April 23, 2026 (updated April 27, 2026)

Any authenticated user (including BASIC role) can escalate to ADMIN on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: POST /account/change-password has no authorization check, allowing any session to overwrite the password hash; the inactive password auth row is never removed on migration; and the login endpoint accepts a client-supplied loginMethod that bypasses the server’s active auth configuration. Together these allow an attacker to set a known password and authenticate as the anonymous admin account created during the multiuser migration.


References

  • actualbudget.org/blog/release-26.4.0
  • github.com/actualbudget/actual
  • github.com/actualbudget/actual/security/advisories/GHSA-prp4-2f49-fcgp
  • github.com/advisories/GHSA-prp4-2f49-fcgp
  • nvd.nist.gov/vuln/detail/CVE-2026-33318

Code Behaviors & Features

Detect and mitigate CVE-2026-33318 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 26.4.0

Fixed versions

  • 26.4.0

Solution

Upgrade to version 26.4.0 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control
  • CWE-862: Missing Authorization

Source file

npm/@actual-app/sync-server/CVE-2026-33318.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:07 +0000.