CVE-2026-22794

Trust Issues: Hijacking Appsmith Accounts via Origin Header Abuse

Alon Barad
Alon Barad
Software Engineer

Jan 15, 2026·5 min read·18 visits

Executive Summary (TL;DR)

Appsmith trusted the client-supplied 'Origin' header when generating password reset links. An attacker can send a reset request for a victim's email with a malicious Origin (e.g., evil.com). The victim receives a valid email from the Appsmith system, but the link points to the attacker's server. Clicking the link leaks the password reset token, allowing the attacker to hijack the account.

A critical Account Takeover (ATO) vulnerability in Appsmith allows unauthenticated attackers to poison password reset emails by spoofing the HTTP Origin header. This manipulation forces the application to generate legitimate emails containing links to attacker-controlled domains, facilitating credential harvesting.

Fix Analysis (1)

Technical Appendix

CVSS Score
9.6/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Probability
0.03%
Top 93% most exploited
5,000
via Shodan

Affected Systems

Appsmith Community Edition < 1.93Appsmith Enterprise Edition < 1.93

Affected Versions Detail

Product
Affected Versions
Fixed Version
Appsmith
Appsmith
< 1.931.93
AttributeDetail
CWE IDCWE-346
Attack VectorNetwork
CVSS Score9.6 (Critical)
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
ImpactAccount Takeover
EPSS Score0.00027
CWE-346
Origin Validation Error

The application does not properly verify that the Origin header matches the expected source, allowing attackers to manipulate the base URL used in generated links.

Vulnerability Timeline

Fix committed to main branch
2025-11-28
CVE Published & Public Disclosure
2026-01-12