CVE-2026-22794
Open Redirect in Appsmith Server Enables Account Takeover
Publication date: 2026-01-12
Last updated on: 2026-01-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| appsmith | appsmith | to 1.93 (exc) |
| appsmith | appsmith | to 1.92 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-346 | The product does not properly verify that the source of data or communication is valid. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability can lead to exposure of personal information such as email addresses and unauthorized account takeover, which may result in non-compliance with data protection regulations like GDPR and HIPAA. The exposure of authentication tokens to attackers and the potential for phishing and malicious redirection increase the risk of data breaches and loss of user trust, potentially causing legal and compliance issues. [2]
Can you explain this vulnerability to me?
This vulnerability in Appsmith versions prior to 1.93 occurs because the server uses the HTTP Origin header from incoming requests directly as the base URL for generating password reset and email verification links without validating it. An attacker can supply a malicious Origin value pointing to their own domain. As a result, password reset or email verification emails sent to victims contain links pointing to the attacker's domain with authentication tokens included. When victims click these links, the tokens are exposed to the attacker, potentially allowing account takeover. [2]
How can this vulnerability impact me? :
This vulnerability can lead to account takeover by unauthorized attackers who obtain authentication tokens from maliciously crafted password reset or email verification links. It exposes sensitive information such as email addresses, increases phishing risks, and can cause malicious redirection to attacker-controlled sites. This can result in loss of user trust, unauthorized access to accounts, and potential legal or compliance issues. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by monitoring HTTP requests to the Appsmith server's /forgotPassword and /resendEmailVerification endpoints for suspicious or unexpected Origin header values. Specifically, look for requests where the Origin header does not match your legitimate base URL. For example, you can use network capture tools like tcpdump or Wireshark to filter HTTP requests with unusual Origin headers. Additionally, on the server, you can check logs for requests to these endpoints with Origin headers pointing to domains other than your configured APPSMITH_BASE_URL. Example commands: 1. Using tcpdump to capture HTTP requests with suspicious Origin headers: tcpdump -i any -A 'tcp port 80 or 443' | grep -i 'Origin: ' 2. Using grep on server logs to find unexpected Origin headers: grep -i 'Origin:' /path/to/appsmith/logs | grep -v 'https://your-legitimate-base-url.com' These methods help identify attempts to exploit the vulnerability by sending requests with attacker-controlled Origin headers. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade your Appsmith installation to version 1.93 or later, where the vulnerability is fixed by validating the Origin header against a configured base URL (APPSMITH_BASE_URL). If upgrading immediately is not possible, configure the APPSMITH_BASE_URL setting in the Admin Settings UI to your legitimate base URL to enable Origin validation. This prevents the server from accepting requests with malicious Origin headers. Additionally, monitor and restrict incoming requests to the /forgotPassword and /resendEmailVerification endpoints to only allow requests from trusted sources. Avoid relying on the Origin header for generating password reset and email verification links until the fix is applied. [1, 2]