Browse all 4 CVE security advisories affecting saltcorn. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Saltcorn is a low-code platform for building web applications and databases. Historically, it has been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, primarily due to improper input validation and access control flaws. The platform's open-source nature has led to several security incidents, with four CVEs recorded to date. These vulnerabilities often stem from its flexible architecture allowing dynamic code execution and insufficient sanitization of user inputs. While Saltcorn enables rapid application development, its security track record indicates a need for rigorous input handling and access control implementation to prevent common web exploitation patterns.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-42259 | Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backslash bypass) — saltcornCWE-601 | 5.4AI | MediumAI | 2026-05-07 |
| CVE-2026-41478 | Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId) — saltcornCWE-89 | 10.0 | Critical | 2026-04-24 |
| CVE-2026-40163 | Saltcorn has an Unauthenticated Path Traversal in sync endpoints allows arbitrary file write and directory read — saltcornCWE-22 | 8.2 | High | 2026-04-10 |
| CVE-2024-47818 | Logged-in users with any role can delete arbitrary files in @saltcorn/server — saltcornCWE-22 | 6.5 | Medium | 2024-10-07 |
This page lists every published CVE security advisory associated with saltcorn. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.