CVE-2026-24042
Appsmith · Appsmith is a platform to build admin Multiple Products
A critical vulnerability has been identified in the Appsmith platform, affecting versions 1.94 and below.
Executive summary
A critical vulnerability has been identified in the Appsmith platform, affecting versions 1.94 and below. This flaw allows unauthenticated attackers to execute unpublished, development-stage actions on publicly accessible applications, bypassing normal security boundaries. Successful exploitation could lead to severe consequences, including sensitive data exposure, unauthorized data modification, and access to internal development resources.
Vulnerability
The vulnerability exists in how Appsmith handles API requests for publicly accessible applications. An unauthenticated remote attacker can craft a POST request to the /api/v1/actions/execute endpoint. By manipulating the viewMode parameter to false or by omitting it entirely, the attacker can trick the application into executing actions that are in "edit-mode" and not yet published for public use. This bypasses the intended security model that should restrict public users to only interact with published, production-ready application logic.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.4, posing a significant threat to the organization. Exploitation can lead to the exposure of highly sensitive data, as edit-mode queries may contain developer credentials, connect to internal databases, or access confidential information not intended for public view. An attacker could execute unauthorized database queries, manipulate application data, or trigger actions with unintended side effects, leading to data integrity loss, operational disruption, and severe reputational damage. The ability to access development data and functions effectively breaks the production/development boundary, exposing the organization to further, more complex attacks.
Remediation
Immediate Action: Update Appsmith is a platform to build admin Multiple Products to the latest version as soon as it is released by the vendor. Due to the critical nature of this vulnerability, this update should be prioritized for all internet-facing instances. After patching, review access logs for any signs of prior exploitation.
Proactive Monitoring: Security teams should actively monitor web server and application logs for suspicious POST requests to the /api/v1/actions/execute endpoint. Specifically, look for requests from external IP addresses that either contain the parameter viewMode=false or are missing the viewMode parameter. Monitor for anomalous behavior from the Appsmith server, such as unexpected database queries, API calls to internal systems, or high resource utilization.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to block or alert on incoming requests to /api/v1/actions/execute that contain viewMode=false. As a more restrictive measure, consider temporarily disabling public access to non-essential Appsmith applications until a patch can be applied. Ensure the Appsmith instance is running with least privilege and that its network access to backend databases and APIs is strictly controlled.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the critical CVSS score of 9.4 and the potential for unauthenticated remote data exposure, this vulnerability requires immediate attention. We strongly recommend that organizations identify all vulnerable Appsmith instances and prepare for an emergency patch deployment as soon as a fix is made available by the vendor. In the interim, the compensating controls outlined above, particularly implementing WAF rules and reviewing public access policies, should be implemented without delay to mitigate the immediate risk. Although this CVE is not currently on the CISA KEV list, its severity warrants treating it with the highest priority.