Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-33318
Published:April 24, 2026
Updated:April 26, 2026
Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including "BASIC" role) can escalate to "ADMIN" on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: "POST /account/change-password" has no authorization check, allowing any session to overwrite the password hash; the inactive password "auth" row is never removed on migration; and the login endpoint accepts a client-supplied "loginMethod" that bypasses the server's active auth configuration. Together these allow an attacker to set a known password and authenticate as the anonymous admin account created during the multiuser migration. The three weaknesses form a single, sequential exploit chain — none produces privilege escalation on its own. Missing authorization on POST /change-password allows overwriting a password hash, but only matters if there is an orphaned row to target. Orphaned password row persisting after migration provides the target row, but is harmless without the ability to authenticate using it. Client-controlled loginMethod: "password" allows forcing password-based auth, but is useless without a known hash established by step 1. All three must be chained in sequence to achieve the impact. No single weakness independently results in privilege escalation. The single root cause is the missing authorization check on /change-password; the other two are preconditions that make it exploitable. Version 26.4.0 contains a fix.
Affected Packages
https://github.com/actualbudget/actual.git (GITHUB):
Affected version(s) >=v22.12.9 <v26.4.0
Fix Suggestion:
Update to version v26.4.0
@actual-app/sync-server (NPM):
Affected version(s) >=25.4.0-alpha.0 <26.4.0
Fix Suggestion:
Update to version 26.4.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Access Control
Missing Authorization
EPSS
Base Score:
0.07