Description
Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.96, a Critical Stored XSS vulnerability exists in the Table Widget (TableWidgetV2). The root cause is a lack of HTML sanitization in the React component rendering pipeline, allowing malicious attributes to be interpolated into the DOM. By leveraging the "Invite Users" feature, an attacker with a regular user account (user@gmail.com) can force a System Administrator to execute a high-privileged API call (/api/v1/admin/env), resulting in a Full Administrative Account Takeover. This vulnerability is fixed in 1.96.
Published: 2026-03-09
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Stored XSS
Action: Immediate Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the TableWidgetV2 component of Appsmith versions prior to 1.96. The flaw arises from missing HTML sanitization in the React rendering pipeline, allowing an attacker to inject malicious attributes that are rendered by browsers. When an ordinary user triggers the "Invite Users" functionality, the injected code causes a System Administrator to unknowingly execute a high‑privileged API call to "/api/v1/admin/env", leading to full administrative takeover. The vulnerability therefore combines a client‑side scripting defect (CWE‑79) with a privilege escalation outcome.

Affected Systems

Appsmith platforms delivering admin panels, internal tools, or dashboards, specifically those manufactured by Appsmith.org and running any version earlier than 1.96. Users of TableWidgetV2 components in these deployments are at risk until the patch is applied.

Risk and Exploitability

The CVSS rating of 9.1 indicates a severe attack, and although the EPSS score is less than 1%, the workaround is straightforward for an attacker with a low‑privilege account. The vulnerability is not currently listed in CISA’s KEV catalog, but the chain of exploitation requires only access to the invite feature and a legitimate user session. Once the attacker supplies the malicious payload, no additional network access or credentials are needed beyond that of a regular user. The exploit path leverages cross‑site scripting in the client side to force a privileged API call, so an attacker can elevate privileges without elevating network privileges.

Generated by OpenCVE AI on April 16, 2026 at 10:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Appsmith patch to version 1.96 or later, which includes proper HTML sanitization for the TableWidgetV2 component.
  • Disable or restrict the Invite Users feature for non‑trusted users until a patch is available, or enforce role‑based restrictions so that only administrators can invite new users.
  • Implement a strict Content Security Policy that disallows inline scripts and whitelists only approved sources to mitigate potential XSS exploitation.

Generated by OpenCVE AI on April 16, 2026 at 10:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Appsmith
Appsmith appsmith
Vendors & Products Appsmith
Appsmith appsmith

Mon, 09 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.96, a Critical Stored XSS vulnerability exists in the Table Widget (TableWidgetV2). The root cause is a lack of HTML sanitization in the React component rendering pipeline, allowing malicious attributes to be interpolated into the DOM. By leveraging the "Invite Users" feature, an attacker with a regular user account (user@gmail.com) can force a System Administrator to execute a high-privileged API call (/api/v1/admin/env), resulting in a Full Administrative Account Takeover. This vulnerability is fixed in 1.96.
Title Critical Stored XSS & Privilege Escalation in Appsmith
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Appsmith Appsmith
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T14:19:20.885Z

Reserved: 2026-03-05T21:27:35.342Z

Link: CVE-2026-30862

cve-icon Vulnrichment

Updated: 2026-03-10T14:19:10.529Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T17:40:14.123

Modified: 2026-03-13T15:34:16.830

Link: CVE-2026-30862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:15:26Z

Weaknesses