PT-2026-3916 · Appsmith · Appsmith
Odgrso
·
Published
2026-01-22
·
Updated
2026-02-17
·
CVE-2026-24042
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Appsmith and Affected Versions
Appsmith versions 1.94 and below
Description
Appsmith is a platform used for building admin panels, internal tools, and dashboards. Publicly accessible applications in versions 1.94 and below are susceptible to a bypass of the expected publish boundary. Unauthenticated users can execute unpublished (edit-mode) actions by sending
viewMode=false or omitting the viewMode parameter in a POST request to the /api/v1/actions/execute API endpoint. This allows execution of edit-mode queries and APIs, potentially leading to sensitive data exposure, development data access, and the triggering of unintended side effects. Reports indicate over 6,000 instances are exposed.API Endpoints:
/api/v1/actions/executeVulnerable Parameters or Variables:
viewModeRecommendations
Versions prior to 1.95 are affected. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BIT-APPSMITH-2026-24042
CVE-2026-24042
GHSA-J9QQ-4FJ9-9883
Affected Products
Appsmith
References · 16
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24042.json⭐ 2487 🔗 561 · Exploit
- https://osv.dev/vulnerability/BIT-appsmith-2026-24042 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-24042 · Security Note
- https://osv.dev/vulnerability/CVE-2026-24042 · Vendor Advisory
- https://github.com/appsmithorg/appsmith/security/advisories/GHSA-j9qq-4fj9-9883⭐ 39077 🔗 4452 · Note
- https://twitter.com/zoomeye_team/status/2014602846512304563 · Twitter Post
- https://t.me/CVEtracker/42743 · Telegram Post
- https://twitter.com/lsof/status/2014399104973963497 · Twitter Post
- https://t.me/cveNotify/152218 · Telegram Post
- https://twitter.com/lsof/status/2014399206463541366 · Twitter Post
- https://twitter.com/VulmonFeeds/status/2014212781298336226 · Twitter Post
- https://twitter.com/cracbot/status/2016103986567512274 · Twitter Post
- https://twitter.com/TheHackerWire/status/2014202342137376770 · Twitter Post
- https://twitter.com/0dayPublishing/status/2014189081429754079 · Twitter Post
- https://twitter.com/CveFindCom/status/2014196135984767264 · Twitter Post