← Back to CVEs
CVE-2026-24042
CRITICAL9.4
Description
Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and below, publicly accessible apps allow unauthenticated users to execute unpublished (edit-mode) actions by sending viewMode=false (or omitting it) to POST /api/v1/actions/execute. This bypasses the expected publish boundary where public viewers should only execute published actions, not edit-mode versions. An attack can result in sensitive data exposure, execution of edit‑mode queries and APIs, development data access, and the ability to trigger side effect behavior. This issue does not have a released fix at the time of publication.
CVE Details
CVSS v3.1 Score9.4
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/22/2026
Last Modified2/17/2026
Sourcenvd
Honeypot Sightings0
Affected Products
appsmith:appsmith
Weaknesses (CWE)
CWE-862
References
https://github.com/appsmithorg/appsmith/security/advisories/GHSA-j9qq-4fj9-9883(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.