CVE-2026-27638: CWE-862: Missing Authorization in actualbudget actual
Actual is a local-first personal finance tool. Prior to version 26.2.1, in multi-user mode (OpenID), the sync API endpoints (`/sync/*`) don't verify that the authenticated user owns or has access to the file being operated on. Any authenticated user can read, modify, and overwrite any other user's budget files by providing their file ID. Version 26.2.1 patches the issue.
AI Analysis
Technical Summary
CVE-2026-27638 is a vulnerability identified in Actual, a personal finance application that operates in a local-first mode but supports multi-user synchronization via OpenID. In versions prior to 26.2.1, the sync API endpoints under the path `/sync/*` lack proper authorization checks to verify that the authenticated user owns or has permission to access the budget files they attempt to operate on. This missing authorization (CWE-862) allows any authenticated user to read, modify, or overwrite any other user's budget files by simply providing the target file's ID. The vulnerability arises because the API trusts the authentication state but fails to enforce access control on resource ownership. Exploitation requires only authenticated access with low complexity and no user interaction, and it can be performed remotely over the network. The flaw impacts the confidentiality and integrity of user financial data, potentially exposing sensitive budget information and enabling malicious alteration of financial records. The vendor addressed this issue in version 26.2.1 by implementing proper authorization checks on the sync endpoints to ensure users can only access their own files. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 base score is 5.7, reflecting medium severity due to the moderate impact and ease of exploitation without privileges beyond authentication.
Potential Impact
The vulnerability allows unauthorized access and modification of sensitive personal financial data, which can lead to privacy breaches and loss of data integrity. For organizations or individuals relying on Actual for financial management, this could result in exposure of confidential budget information, manipulation of financial records, and potential financial fraud or identity theft. Since the flaw affects multi-user mode with OpenID authentication, environments where multiple users share the same Actual deployment or cloud sync service are at risk. The impact extends to trust erosion in the application and potential regulatory compliance issues related to data protection. Although availability is not affected, the compromise of confidentiality and integrity can have serious consequences for users' financial security and organizational risk posture.
Mitigation Recommendations
The primary mitigation is to upgrade Actual to version 26.2.1 or later, where the authorization checks on sync API endpoints are properly enforced. Organizations should audit their Actual deployments to identify any instances running vulnerable versions and prioritize patching. Additionally, administrators should review user access controls and monitor API usage logs for suspicious activity indicating unauthorized file access attempts. Implementing network segmentation and restricting access to the sync API endpoints to trusted users can reduce exposure. Where possible, enforce multi-factor authentication for OpenID accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, educating users about the importance of software updates and monitoring for unusual financial data changes can help detect exploitation attempts early.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Netherlands, Sweden, Japan, South Korea
CVE-2026-27638: CWE-862: Missing Authorization in actualbudget actual
Description
Actual is a local-first personal finance tool. Prior to version 26.2.1, in multi-user mode (OpenID), the sync API endpoints (`/sync/*`) don't verify that the authenticated user owns or has access to the file being operated on. Any authenticated user can read, modify, and overwrite any other user's budget files by providing their file ID. Version 26.2.1 patches the issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-27638 is a vulnerability identified in Actual, a personal finance application that operates in a local-first mode but supports multi-user synchronization via OpenID. In versions prior to 26.2.1, the sync API endpoints under the path `/sync/*` lack proper authorization checks to verify that the authenticated user owns or has permission to access the budget files they attempt to operate on. This missing authorization (CWE-862) allows any authenticated user to read, modify, or overwrite any other user's budget files by simply providing the target file's ID. The vulnerability arises because the API trusts the authentication state but fails to enforce access control on resource ownership. Exploitation requires only authenticated access with low complexity and no user interaction, and it can be performed remotely over the network. The flaw impacts the confidentiality and integrity of user financial data, potentially exposing sensitive budget information and enabling malicious alteration of financial records. The vendor addressed this issue in version 26.2.1 by implementing proper authorization checks on the sync endpoints to ensure users can only access their own files. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 base score is 5.7, reflecting medium severity due to the moderate impact and ease of exploitation without privileges beyond authentication.
Potential Impact
The vulnerability allows unauthorized access and modification of sensitive personal financial data, which can lead to privacy breaches and loss of data integrity. For organizations or individuals relying on Actual for financial management, this could result in exposure of confidential budget information, manipulation of financial records, and potential financial fraud or identity theft. Since the flaw affects multi-user mode with OpenID authentication, environments where multiple users share the same Actual deployment or cloud sync service are at risk. The impact extends to trust erosion in the application and potential regulatory compliance issues related to data protection. Although availability is not affected, the compromise of confidentiality and integrity can have serious consequences for users' financial security and organizational risk posture.
Mitigation Recommendations
The primary mitigation is to upgrade Actual to version 26.2.1 or later, where the authorization checks on sync API endpoints are properly enforced. Organizations should audit their Actual deployments to identify any instances running vulnerable versions and prioritize patching. Additionally, administrators should review user access controls and monitor API usage logs for suspicious activity indicating unauthorized file access attempts. Implementing network segmentation and restricting access to the sync API endpoints to trusted users can reduce exposure. Where possible, enforce multi-factor authentication for OpenID accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, educating users about the importance of software updates and monitoring for unusual financial data changes can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T22:02:30.029Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a0c89232ffcdb8a25244f7
Added to database: 2/26/2026, 10:26:26 PM
Last enriched: 2/26/2026, 10:43:02 PM
Last updated: 2/27/2026, 6:19:10 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27653: Incorrect default permissions in Soliton Systems K.K. Soliton SecureBrowser for OneGate
MediumCVE-2026-3301: OS Command Injection in Totolink N300RH
CriticalCVE-2026-3293: Inefficient Regular Expression Complexity in snowflakedb snowflake-jdbc
MediumCVE-2026-28372: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in GNU inetutils
HighCVE-2026-3292: SQL Injection in jizhiCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.