Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially leading to account takeover. This vulnerability is fixed in 1.93.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:* |
Tue, 13 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Appsmith
Appsmith appsmith |
|
| Vendors & Products |
Appsmith
Appsmith appsmith |
Mon, 12 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially leading to account takeover. This vulnerability is fixed in 1.93. | |
| Title | Account Takeover Vulnerability in Appsmith | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-12T21:54:52.803Z
Updated: 2026-01-13T19:08:29.794Z
Reserved: 2026-01-09T18:27:19.389Z
Link: CVE-2026-22794
Updated: 2026-01-13T14:14:38.909Z
Status : Analyzed
Published: 2026-01-12T22:16:08.633
Modified: 2026-01-21T19:14:17.880
Link: CVE-2026-22794
No data.