CVE-2026-30862
Received Received - Intake
Critical Stored XSS in Appsmith Table Widget Enables Admin Takeover

Publication date: 2026-03-10

Last updated on: 2026-03-13

Assigner: GitHub, Inc.

Description
Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.96, a Critical Stored XSS vulnerability exists in the Table Widget (TableWidgetV2). The root cause is a lack of HTML sanitization in the React component rendering pipeline, allowing malicious attributes to be interpolated into the DOM. By leveraging the "Invite Users" feature, an attacker with a regular user account ([email protected]) can force a System Administrator to execute a high-privileged API call (/api/v1/admin/env), resulting in a Full Administrative Account Takeover. This vulnerability is fixed in 1.96.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-13
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
appsmith appsmith to 1.96 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-30862 is a critical Stored Cross-Site Scripting (XSS) vulnerability in Appsmith versions up to 1.95, specifically in the Table Widget (TableWidgetV2). The issue arises because the React component responsible for rendering table cells does not properly sanitize user input, allowing malicious HTML and scripts to be injected directly into the DOM.'}, {'type': 'paragraph', 'content': 'An attacker with a regular user account can exploit this by injecting malicious payloads into the table data, which are then rendered unsanitized. By leveraging the "Invite Users" feature, the attacker can trick a System Administrator into opening a malicious table, causing the administrator\'s browser to execute the injected script with high privileges.'}, {'type': 'paragraph', 'content': 'This leads to a Cross-Privilege Request Forgery (CPRF) attack, where the attacker can perform high-privileged API calls on behalf of the administrator, ultimately resulting in a full administrative account takeover of the Appsmith instance.'}] [1]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including complete compromise of the Appsmith instance.

  • Full administrative account takeover, allowing the attacker to control the entire application.
  • Exposure of sensitive environment variables and database credentials.
  • Ability to modify any application within the environment.
  • Potential disruption of confidentiality, integrity, and availability of the system.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by inspecting the Table Widget (TableWidgetV2) in Appsmith versions up to 1.95 for unsanitized user input, especially in columns set to URL or Plain Text types. Look for injected HTML or JavaScript payloads in the Table Data property that could execute when rendered.

Since the attack involves a Stored Cross-Site Scripting (XSS) payload that executes when an administrator opens a malicious table, detection can include monitoring for unusual API calls to /api/v1/admin/env triggered by user interactions.

Suggested commands or methods include:

  • Review application logs for suspicious API calls to /api/v1/admin/env.
  • Use web application security scanners to detect stored XSS vulnerabilities in the Table Widget.
  • Manually inspect Table Widget data inputs for embedded HTML or JavaScript tags, such as <img> tags with onerror attributes.
  • Monitor network traffic for unexpected requests or privilege escalation attempts originating from user accounts.

What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade Appsmith to version 1.96 or later, where this vulnerability is fixed.'}, {'type': 'paragraph', 'content': "Additional mitigation includes sanitizing all dynamic outputs in the Table Widget's BasicCell component using a library like DOMPurify.sanitize() to prevent injection of malicious HTML or scripts."}, {'type': 'paragraph', 'content': 'Enforce a strict Content Security Policy (CSP), especially a restrictive connect-src directive, to prevent unauthorized API calls from malicious scripts.'}, {'type': 'paragraph', 'content': 'Limit user privileges and monitor the use of the "Invite Users" feature to reduce the risk of social engineering attacks.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart