top of page
perceptive_background_267k.jpg

Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the em…

Published:

11 januari 2026 om 23:00:00

Alert date:

12 januari 2026 om 23:02:09

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

Appsmith platform vulnerability allows attackers to manipulate Origin header values to redirect password reset and email verification links to attacker-controlled domains. The server fails to validate the Origin header before using it as the email link baseUrl. This leads to authentication token exposure and potential account takeover attacks. The vulnerability affects versions prior to 1.93 and has been patched in version 1.93. The attack vector exploits the email-based authentication flow by intercepting tokens meant for legitimate users.

Technical details

Mitigation steps:

Affected products:

Appsmith

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page