Impact
A one‑click vulnerability in AFFiNE allows an attacker to craft a malicious affine: URL that, when opened by a victim’s browser, triggers the AFFiNE custom URL handler to execute arbitrary code on the victim’s machine without any further action. The flaw originates from improper validation of the URL payload and is classified as a command injection type weakness. Successful exploitation compromises confidentiality, integrity, and availability by giving the attacker full control over the affected system.
Affected Systems
The vulnerability affects the AFFiNE workspace application provided by toeverything. Any installation of AFFiNE earlier than version 0.25.4 is susceptible; the patch is included in version 0.25.4 and later. No additional affected versions are listed.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity. The EPSS score of < 1% indicates a low exploitation probability, and the vulnerability is not listed in the KEV catalog. Despite the low likelihood, the high impact suggests organizations should address the flaw promptly but can accept a short grace period if patching cannot occur immediately.
OpenCVE Enrichment