CVE-2026-41161
Awaiting Analysis Awaiting Analysis - Queue
Username Enumeration via Timing Attack in Sync-in Server

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: GitHub, Inc.

Description
Sync-in Server is a secure, open-source platform for file storage, sharing, collaboration, and syncing. Prior to version 2.2.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. This issue has been patched in version 2.2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
sync-in server to 2.2.0 (exc)
sync-in server to 2.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-208 Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated remote attackers to enumerate valid usernames by measuring response times, which can lead to targeted attacks such as brute-force, credential stuffing, and social engineering.

Such exposure of user information can increase the risk of unauthorized access to personal data, potentially impacting compliance with data protection regulations like GDPR and HIPAA that require safeguarding user identity and access controls.

By enabling attackers to confirm valid usernames, the vulnerability weakens the security posture of the system, making it harder to meet standards that mandate protection against unauthorized data disclosure and identity enumeration.


Can you explain this vulnerability to me?

CVE-2026-41161 is a security vulnerability in the Sync-in Server application, specifically affecting versions 2.1.0 and below. It involves a logic flaw in the /api/auth/login endpoint that allows unauthenticated remote attackers to enumerate valid usernames by analyzing the application's response time.

The vulnerability arises because the system responds faster to invalid usernames (95-100ms) than to valid ones (350-400ms). This timing difference enables attackers to determine whether a username exists in the system, facilitating user account enumeration.

This issue is classified as a timing attack and is related to CWE-208, which involves information exposure through timing discrepancies. The vulnerability was reported and fixed in version 2.2.0 by implementing measures to prevent such timing attacks.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to enumerate valid usernames on your Sync-in Server instance without authentication.

  • Facilitation of brute-force attacks by knowing which usernames are valid.
  • Credential stuffing attacks using known valid usernames.
  • Social engineering attacks targeting identified users.

Overall, this can lead to unauthorized access attempts and compromise of user accounts, increasing the risk to your system's security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing the response times of the /api/auth/login endpoint when submitting different usernames. Valid usernames cause the server to respond slower (350-400ms) compared to invalid usernames (95-100ms).

To detect this on your system or network, you can perform timing analysis by sending login requests with various usernames and measuring the response times to identify discrepancies that indicate valid usernames.

  • Use curl or similar tools to send POST requests to the /api/auth/login endpoint with different usernames and measure response times.
  • Example command using curl and time measurement in a Unix shell:

time curl -X POST https://your-sync-in-server/api/auth/login -d '{"username":"testuser","password":"any"}' -H 'Content-Type: application/json'

By comparing the real time output for different usernames, you can detect timing differences that reveal valid usernames.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade the Sync-in Server application to version 2.2.0 or later, where the timing attack flaw has been fixed.

This update implements measures to prevent timing attacks that reveal whether a username exists by normalizing response times.

If upgrading immediately is not possible, consider implementing temporary mitigations such as adding artificial delays to login responses or monitoring for unusual login attempts that may indicate enumeration attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart