Cyber Posture

CVE-2026-41478

Critical

Published: 24 April 2026

Published
24 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0003 9.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41478 is a critical-severity SQL Injection (CWE-89) vulnerability in Saltcorn Saltcorn. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection vulnerabilities like CVE-2026-41478 by requiring validation and sanitization of all inputs, including mobile-sync parameters.

prevent

Mandates timely remediation of identified flaws, such as patching Saltcorn to versions 1.4.6, 1.5.6, or 1.6.0-beta.5 to fix the SQL injection.

prevent

Restricts the types and quantities of inputs to the system at interfaces, preventing malicious SQL payloads from being processed in mobile-sync routes.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

The SQL injection vulnerability in the public-facing Saltcorn web application directly enables T1190 (Exploit Public-Facing Application) for remote initial access; successful exploitation allows arbitrary SQL queries resulting in full database exfiltration, directly facilitating T1213.006 (Data from Information Repositories: Databases).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to at least one table to inject arbitrary…

more

SQL through sync parameters. This can lead to full database exfiltration, including admin password hashes and configuration secrets, and may also enable database modification or destruction depending on the backend. This vulnerability is fixed in 1.4.6, 1.5.6, and 1.6.0-beta.5.

Deeper analysisAI

CVE-2026-41478 is a SQL injection vulnerability (CWE-89) in Saltcorn, an extensible open-source no-code database application builder. The issue affects versions prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, specifically in the mobile-sync routes, where sync parameters fail to properly sanitize input, enabling arbitrary SQL injection.

Any authenticated low-privilege user with read access to at least one table can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows full database exfiltration, including admin password hashes and configuration secrets, and may enable data modification or destruction depending on the backend database. The CVSS v3.1 base score is 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), reflecting its critical impact.

Saltcorn addresses this vulnerability in releases 1.4.6, 1.5.6, and 1.6.0-beta.5. Security practitioners should upgrade to these patched versions immediately. Additional details are available in the GitHub security advisory at https://github.com/saltcorn/saltcorn/security/advisories/GHSA-jp74-mfrx-3qvh.

Details

CWE(s)

Affected Products

saltcorn
saltcorn
1.6.0 · ≤ 1.4.6 · 1.5.0 — 1.5.6

CVEs Like This One

CVE-2026-40163Same product: Saltcorn Saltcorn
CVE-2026-23492Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2025-25116Shared CWE-89
CVE-2025-52025Shared CWE-89
CVE-2025-56316Shared CWE-89
CVE-2026-0702Shared CWE-89
CVE-2025-67146Shared CWE-89
CVE-2026-25936Shared CWE-89
CVE-2025-69215Shared CWE-89

References