Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21853: CWE-94: Improper Control of Generation of Code ('Code Injection') in toeverything AFFiNE

0
High
VulnerabilityCVE-2026-21853cvecve-2026-21853cwe-94
Published: Mon Mar 02 2026 (03/02/2026, 18:55:04 UTC)
Source: CVE Database V5
Vendor/Project: toeverything
Product: AFFiNE

Description

AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.25.4, there is a one-click remote code execution vulnerability. This vulnerability can be exploited by embedding a specially crafted affine: URL on a website. An attacker can trigger the vulnerability in two common scenarios: 1/ A victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or 2/ A victim clicks on a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes AFFiNE custom URL handler, which launches the AFFiNE app and processes the crafted URL. This results in arbitrary code execution on the victim’s machine, without further interaction. This issue has been patched in version 0.25.4.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:32:36 UTC

Technical Analysis

CVE-2026-21853 is a remote code execution vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting AFFiNE, an open-source workspace and operating system. The vulnerability exists in AFFiNE's handling of its custom URL scheme, affine:. When a user visits a malicious website or clicks a crafted link containing a specially crafted affine: URL, the browser invokes AFFiNE's URL handler, which launches the AFFiNE application and processes the URL. Due to insufficient validation and control over the code generated or executed from this URL, an attacker can execute arbitrary code on the victim’s machine. This attack vector requires no prior authentication and minimal user interaction (just visiting or clicking a link). The vulnerability affects all AFFiNE versions prior to 0.25.4 and has been patched in that release. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. Although no known exploits have been reported in the wild, the ease of exploitation and potential impact make this a critical issue for users of AFFiNE. The flaw stems from improper sanitization and control of code executed via the custom URL handler, a common risk in applications exposing custom protocols without strict validation.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting malicious websites or clicking crafted links. This can lead to full system compromise, including theft of sensitive data, installation of malware, disruption of services, and lateral movement within networks. Since AFFiNE is an all-in-one workspace and operating system, attackers gaining code execution can access a wide range of user data and system resources. The lack of authentication and minimal user interaction required increases the risk of widespread exploitation. Organizations relying on AFFiNE for productivity or operational tasks face significant risk of data breaches, operational disruption, and potential reputational damage. The vulnerability's network vector and ease of exploitation make it suitable for phishing campaigns or drive-by attacks, increasing the attack surface. Although no exploits are currently known in the wild, the high CVSS score and nature of the flaw warrant urgent remediation to prevent future attacks.

Mitigation Recommendations

1. Immediate upgrade to AFFiNE version 0.25.4 or later, where the vulnerability is patched, is the primary mitigation step. 2. Until patching is possible, users should be advised to avoid clicking on unknown or suspicious affine: links and visiting untrusted websites. 3. Organizations should implement network-level protections such as URL filtering and web content scanning to block or flag malicious affine: URLs. 4. Disable or restrict the AFFiNE custom URL handler if feasible, especially in environments where AFFiNE is not essential or can be replaced. 5. Employ endpoint detection and response (EDR) solutions to monitor for suspicious process launches or unusual AFFiNE app behavior. 6. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. 7. Review and harden browser and OS settings to limit automatic invocation of custom URL handlers where possible. 8. Monitor security advisories and threat intelligence feeds for any emerging exploit activity related to this CVE. These targeted mitigations go beyond generic advice by focusing on the custom URL handler attack vector and user interaction minimization.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T16:44:16.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5e27dd1a09e29cb26d651

Added to database: 3/2/2026, 7:18:21 PM

Last enriched: 3/2/2026, 7:32:36 PM

Last updated: 3/2/2026, 8:23:44 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses