Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22794: CWE-346: Origin Validation Error in appsmithorg appsmith

0
Critical
VulnerabilityCVE-2026-22794cvecve-2026-22794cwe-346
Published: Mon Jan 12 2026 (01/12/2026, 21:54:52 UTC)
Source: CVE Database V5
Vendor/Project: appsmithorg
Product: appsmith

Description

CVE-2026-22794 is a critical origin validation vulnerability in Appsmith versions prior to 1. 93. The server improperly uses the Origin header from HTTP requests as the base URL for password reset and email verification links without validation. An attacker who can control the Origin header can craft emails with links pointing to a malicious domain, exposing authentication tokens and enabling account takeover. This vulnerability affects confidentiality, integrity, and availability of user accounts. It requires no privileges but does require user interaction to click the malicious link. The issue is fixed in Appsmith version 1. 93. European organizations using vulnerable Appsmith versions should urgently update to mitigate risk. Countries with significant adoption of Appsmith and critical internal tooling deployments are most at risk.

AI-Powered Analysis

AILast updated: 01/21/2026, 03:02:26 UTC

Technical Analysis

CVE-2026-22794 is a critical security vulnerability classified under CWE-346 (Origin Validation Error) affecting Appsmith, a popular platform for building admin panels, internal tools, and dashboards. Prior to version 1.93, Appsmith’s server logic uses the Origin HTTP request header as the base URL for generating password reset and email verification links sent to users, without validating whether the Origin is trustworthy or belongs to the legitimate domain. This flaw allows an attacker who can manipulate the Origin header—such as through a crafted request or a man-in-the-middle scenario—to cause the system to generate email links that point to an attacker-controlled domain. When users click these malicious links, the embedded authentication tokens (used for password resets or email verification) are exposed to the attacker. This can lead to account takeover, compromising user confidentiality and integrity, and potentially impacting availability if accounts are locked or misused. The vulnerability is remotely exploitable without authentication (AV:N/PR:N), requires user interaction (UI:R), and has a scope change (S:C) because the attacker can affect resources beyond their privileges. The CVSS v3.1 base score is 9.7, indicating critical severity. Although no known exploits are reported in the wild yet, the risk is high due to the ease of exploitation and the sensitive nature of the tokens exposed. The vulnerability was publicly disclosed on January 12, 2026, and fixed in Appsmith version 1.93. Organizations using earlier versions should prioritize patching to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of internal tools and administrative dashboards built on Appsmith. Successful exploitation can lead to unauthorized account access, enabling attackers to manipulate sensitive business data, disrupt operations, or escalate privileges within internal systems. Confidential information such as user credentials, internal reports, and configuration data could be exposed or altered. The impact extends to regulatory compliance, as data breaches involving personal or sensitive information could violate GDPR and other data protection laws, leading to legal and financial penalties. Additionally, compromised internal tools may serve as pivot points for broader network intrusions. The requirement for user interaction means phishing or social engineering campaigns could be used to trick users into clicking malicious links, increasing the attack surface. Organizations relying heavily on Appsmith for critical internal workflows are particularly vulnerable, and the potential for widespread disruption is high if multiple accounts are compromised.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all Appsmith instances to version 1.93 or later, where the origin validation flaw is fixed. Until upgrades are complete, organizations should implement strict network controls to limit access to Appsmith servers, reducing exposure to untrusted origins. Email templates and link generation logic should be audited to ensure no unvalidated user input influences URLs. Implementing multi-factor authentication (MFA) can reduce the impact of compromised credentials. Security awareness training should emphasize the risks of clicking unexpected password reset or verification links, especially those with suspicious domains. Monitoring and logging of password reset and email verification requests can help detect anomalous activity indicative of exploitation attempts. Finally, organizations should review and restrict CORS policies and validate all incoming Origin headers on the server side to prevent similar origin-based attacks in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696570edda2266e8383118a2

Added to database: 1/12/2026, 10:08:45 PM

Last enriched: 1/21/2026, 3:02:26 AM

Last updated: 2/7/2026, 5:20:15 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats