Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24042: CWE-862: Missing Authorization in appsmithorg appsmith

0
Critical
VulnerabilityCVE-2026-24042cvecve-2026-24042cwe-862
Published: Thu Jan 22 2026 (01/22/2026, 03:52:54 UTC)
Source: CVE Database V5
Vendor/Project: appsmithorg
Product: appsmith

Description

CVE-2026-24042 is a critical missing authorization vulnerability in Appsmith versions 1. 94 and below. It allows unauthenticated users to execute unpublished, edit-mode actions by manipulating the POST /api/v1/actions/execute endpoint with the viewMode parameter. This bypasses the intended publish boundary, exposing sensitive data and enabling execution of development queries and APIs. The flaw can lead to unauthorized data access and unintended side effects. No official patch is available at the time of disclosure. The vulnerability has a CVSS score of 9. 4, indicating high exploitability and impact without requiring authentication or user interaction. European organizations using Appsmith for internal tools and dashboards are at risk, especially those with publicly accessible apps. Immediate mitigation and monitoring are advised to prevent exploitation.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:56:39 UTC

Technical Analysis

CVE-2026-24042 is a critical authorization bypass vulnerability affecting Appsmith, an open-source platform used to build admin panels, internal tools, and dashboards. In versions 1.94 and earlier, the application fails to properly enforce authorization checks on the POST /api/v1/actions/execute endpoint. Specifically, when the 'viewMode' parameter is set to false or omitted, unauthenticated users can execute unpublished, edit-mode actions that are intended only for authenticated developers or editors. This flaw effectively allows attackers to bypass the publish boundary that segregates published (view-only) actions from unpublished (edit-mode) ones. As a result, attackers can execute queries and APIs that may expose sensitive development data, internal configurations, or trigger side effects such as database modifications or external API calls. The vulnerability stems from CWE-862 (Missing Authorization), indicating that the application does not verify whether the requester has the necessary permissions before executing sensitive actions. The CVSS v3.1 score of 9.4 reflects the vulnerability's network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H), integrity (I:H), and low impact on availability (A:L). At the time of publication, no official patch or fix has been released, increasing the urgency for organizations to implement compensating controls. Although no known exploits have been reported in the wild, the ease of exploitation and potential impact make this a significant threat to any organization using vulnerable Appsmith versions, especially those exposing apps publicly.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality and integrity of internal data and systems. Appsmith is commonly used to build internal dashboards and admin tools that often interface with sensitive databases and APIs. Exploitation could lead to unauthorized data disclosure, including development secrets, business-critical information, or personally identifiable information (PII) protected under GDPR. The ability to execute edit-mode actions may also allow attackers to manipulate backend systems or trigger unintended side effects, potentially disrupting business operations or causing data corruption. Organizations with publicly accessible Appsmith applications are particularly vulnerable, as attackers do not require authentication or user interaction to exploit the flaw. This could lead to regulatory compliance issues, reputational damage, and financial losses. The lack of an official patch at disclosure heightens the risk, necessitating immediate mitigation efforts. Furthermore, the vulnerability could be leveraged as a foothold for further lateral movement within enterprise networks, increasing the overall threat landscape for European businesses relying on Appsmith.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several specific mitigations to reduce risk. First, restrict public access to Appsmith applications by enforcing network-level controls such as IP whitelisting, VPN access, or web application firewalls (WAFs) to limit exposure to trusted users only. Second, configure reverse proxies or API gateways to validate and block requests that omit or set 'viewMode=false' on the /api/v1/actions/execute endpoint, effectively preventing unauthorized execution of edit-mode actions. Third, conduct thorough audits of all Appsmith applications to identify any publicly accessible instances and assess the sensitivity of exposed data. Fourth, implement strict monitoring and alerting on API usage patterns indicative of exploitation attempts, such as unusual POST requests to the vulnerable endpoint. Fifth, consider temporarily disabling or removing unpublished actions or development APIs from public-facing environments. Finally, maintain close communication with the Appsmith vendor and community for updates on patches or official fixes, and plan for rapid deployment once available. These targeted mitigations go beyond generic advice by focusing on access control, request validation, and operational monitoring specific to the vulnerability's exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6971a2234623b1157c33647c

Added to database: 1/22/2026, 4:05:55 AM

Last enriched: 1/29/2026, 8:56:39 AM

Last updated: 2/7/2026, 10:02:54 AM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats