

Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the em…
Published:
11 January 2026 at 23:00:00
Alert date:
12 January 2026 at 23:02:09
Source:
nvd.nist.gov
Web Technologies, Identity & Access
Appsmith platform vulnerability allows attackers to manipulate Origin header values to redirect password reset and email verification links to attacker-controlled domains. The server fails to validate the Origin header before using it as the email link baseUrl. This leads to authentication token exposure and potential account takeover attacks. The vulnerability affects versions prior to 1.93 and has been patched in version 1.93. The attack vector exploits the email-based authentication flow by intercepting tokens meant for legitimate users.
Technical details
Mitigation steps:
Affected products:
Appsmith
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-22794
https://github.com/appsmithorg/appsmith/commit/6f9ee6226bac13fb4b836940b557913fff78b633
https://github.com/appsmithorg/appsmith/security/advisories/GHSA-7hf5-mc28-xmcv
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.

