VYPR
Medium severity5.3NVD Advisory· Published May 8, 2026· Updated May 12, 2026

CVE-2026-41161

CVE-2026-41161

Description

Sync-in Server is a secure, open-source platform for file storage, sharing, collaboration, and syncing. Prior to version 2.2.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. This issue has been patched in version 2.2.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Sync-in Server before 2.2.0 allows unauthenticated remote attackers to enumerate valid usernames via response-time analysis on the /api/auth/login endpoint.

Vulnerability

Overview

CVE-2026-41161 is a timing-based username enumeration vulnerability in Sync-in Server, an open-source file storage and collaboration platform. The flaw resides in the /api/auth/login endpoint, specifically within the compareUserPassword function. When an invalid username is provided, the function returns early after failing to find a user record, resulting in a significantly shorter response time (approximately 95–100 ms) compared to a valid username (approximately 350–400 ms) [4]. This timing discrepancy allows an unauthenticated remote attacker to distinguish between valid and invalid usernames.

Exploitation

An attacker can exploit this vulnerability by sending authentication requests to the /api/auth/login endpoint with different usernames and measuring the server's response time. No authentication is required, and the attack can be performed remotely over the network. The timing difference was validated using tools such as the TickTock Enum Burp Suite extension [4]. The attack surface is the login endpoint, which is typically exposed to the internet.

Impact

Successful exploitation enables an unauthenticated remote attacker to enumerate valid usernames on the Sync-in Server instance. This information significantly weakens the application's security posture by facilitating targeted attacks, including brute-force password guessing, credential stuffing, and social engineering campaigns [4]. The enumeration itself does not grant access but is a critical stepping stone for further compromise.

Mitigation

The vulnerability has been patched in Sync-in Server version 2.2.0 [2]. The fix involves security hardening of the Basic Auth mechanism to ensure consistent response timing regardless of whether a username is valid [2]. Users are strongly advised to upgrade to version 2.2.0 or later. No workarounds have been publicly documented.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@sync-in/servernpm
< 2.2.02.2.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.