Improper Origin Handling Vulnerability in Appsmith Platform
CVE-2026-22794

9.7CRITICAL

Key Information:

Status
Vendor
CVE Published:
12 January 2026

Badges

πŸ“ˆ Score: 406πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2026-22794?

CVE-2026-22794 is an improper origin handling vulnerability in the Appsmith platform, which is utilized for developing admin panels, internal tools, and dashboards. This flaw arises from the server's inadequate validation of the Origin header in request headers prior to version 1.93. As a consequence, an attacker who controls the Origin value could exploit this vulnerability to craft password reset and email verification links that redirect to a malicious domain. Such links could lead to the exposure of authentication tokens, effectively facilitating account takeover. Organizations relying on Appsmith for their internal applications and toolsets face significant risks if they operate on versions prior to 1.93, as this breach could undermine user trust and operational integrity.

Potential impact of CVE-2026-22794

  1. Account Takeover: Exploitation of this vulnerability can allow attackers to hijack user accounts by manipulating reset or verification links, potentially compromising sensitive information and functionalities tied to these accounts.

  2. Data Exposure: The exposure of authentication tokens may lead to unauthorized access to sensitive data stored within applications built on Appsmith, risking personal and proprietary information.

  3. Operational Disruption: Given the critical nature of the tools built using Appsmith, successful exploits could disrupt internal operations, leading to downtime and the potential for significant financial losses and reputational damage.

Affected Version(s)

appsmith < 1.93

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.7
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.