CVE-2026-41308
Description
Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated creation of file-type pushes through a generic JSON API create path under certain configurations. This could bypass the intended authentication boundary for file push creation. This issue has been patched in versions 1.69.3 and 2.4.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-41308: Unauthenticated file push creation in Password Pusher due to inconsistent authentication checks in the JSON API.
Vulnerability
Analysis
Password Pusher versions prior to 1.69.3 and 2.4.2 contain an authentication bypass vulnerability affecting file-type push creation. The root cause lies in inconsistent enforcement of authentication checks when the application is configured to allow anonymous access (allow_anonymous: true). The code previously only checked Settings.allow_anonymous to decide whether to authenticate, but did not separately enforce authentication for file pushes created via the JSON API. This meant an API endpoint that accepted a :files parameter or a kind: "file" parameter could create a file push without requiring the user to be logged in, even though such operations should be restricted to authenticated users [1][2].
Exploitation
An unauthenticated attacker can exploit this by sending a crafted POST request to the generic JSON API create path (e.g., /p.json or the v2 API endpoint) that includes either a files key or sets kind: "file". No prior authentication or session is needed. However, exploitation depends on the application configuration: file push functionality must be enabled, and anonymous creation must not be fully disabled (i.e., allow_anonymous must be true). If allow_anonymous is set to false, the vulnerability does not apply because all create actions already require authentication [1][2].
Impact
The primary impact is unauthorized creation of file-type pushes, leading to potential resource exhaustion (storage and bandwidth) from an unauthenticated actor. The advisory notes no direct data confidentiality impact from this issue alone, but the ability to store arbitrary data without authentication could be leveraged in combination with other weaknesses or for denial-of-service [2].
Mitigation
Both affected series have been patched: OSS v1 users should upgrade to v1.69.4 (or v1.69.3 if v1.69.4 is not available), and v2 users should upgrade to v2.4.2. The fix ensures authentication is consistently enforced for any create request that indicates file intent, across all supported API paths [1][3]. If immediate upgrade is not possible, administrators can mitigate the risk by disabling anonymous creation (allow_anonymous: false), disabling file push functionality entirely, or blocking untrusted API traffic at a reverse proxy or WAF [2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.