Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 13 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Appsmith
Appsmith appsmith |
|
| Vendors & Products |
Appsmith
Appsmith appsmith |
Mon, 12 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially leading to account takeover. This vulnerability is fixed in 1.93. | |
| Title | Account Takeover Vulnerability in Appsmith | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-13T19:08:29.794Z
Reserved: 2026-01-09T18:27:19.389Z
Link: CVE-2026-22794
Updated: 2026-01-13T14:14:38.909Z
Status : Awaiting Analysis
Published: 2026-01-12T22:16:08.633
Modified: 2026-01-13T20:16:10.910
Link: CVE-2026-22794
No data.
OpenCVE Enrichment
Updated: 2026-01-13T09:27:17Z