CVE-2026-41478
Published: 24 April 2026
Summary
CVE-2026-41478 is a critical-severity SQL Injection (CWE-89) vulnerability in Saltcorn Saltcorn. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection vulnerabilities like CVE-2026-41478 by requiring validation and sanitization of all inputs, including mobile-sync parameters.
Mandates timely remediation of identified flaws, such as patching Saltcorn to versions 1.4.6, 1.5.6, or 1.6.0-beta.5 to fix the SQL injection.
Restricts the types and quantities of inputs to the system at interfaces, preventing malicious SQL payloads from being processed in mobile-sync routes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The SQL injection vulnerability in the public-facing Saltcorn web application directly enables T1190 (Exploit Public-Facing Application) for remote initial access; successful exploitation allows arbitrary SQL queries resulting in full database exfiltration, directly facilitating T1213.006 (Data from Information Repositories: Databases).
NVD Description
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to at least one table to inject arbitrary…
more
SQL through sync parameters. This can lead to full database exfiltration, including admin password hashes and configuration secrets, and may also enable database modification or destruction depending on the backend. This vulnerability is fixed in 1.4.6, 1.5.6, and 1.6.0-beta.5.
Deeper analysisAI
CVE-2026-41478 is a SQL injection vulnerability (CWE-89) in Saltcorn, an extensible open-source no-code database application builder. The issue affects versions prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, specifically in the mobile-sync routes, where sync parameters fail to properly sanitize input, enabling arbitrary SQL injection.
Any authenticated low-privilege user with read access to at least one table can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows full database exfiltration, including admin password hashes and configuration secrets, and may enable data modification or destruction depending on the backend database. The CVSS v3.1 base score is 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), reflecting its critical impact.
Saltcorn addresses this vulnerability in releases 1.4.6, 1.5.6, and 1.6.0-beta.5. Security practitioners should upgrade to these patched versions immediately. Additional details are available in the GitHub security advisory at https://github.com/saltcorn/saltcorn/security/advisories/GHSA-jp74-mfrx-3qvh.
Details
- CWE(s)