Description
Appsmith versions prior to 1.98 expose sensitive instance management API endpoints without authentication. Unauthenticated attackers can query endpoints like /api/v1/consolidated-api/view and /api/v1/tenants/current to retrieve configuration metadata, license information, and unsalted SHA-256 hashes of admin email domains for reconnaissance and targeted attack planning.
Published: 2026-03-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

Appsmith versions before 1.98 expose sensitive management API endpoints without requiring authentication. The flaw is a missing authentication check, identified as CWE‑306. Unauthenticated users can request URLs such as /api/v1/consolidated-api/view and /api/v1/tenants/current to collect configuration metadata, license data, and unsalted SHA‑256 hashes of administrative email domains, which can aid in reconnaissance and targeted attack planning.

Affected Systems

All installations of Appsmith running any version older than 1.98 are affected, regardless of deployment size or environment. The vulnerability exists because the default API endpoints remain exposed and lack proper access controls.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, and the EPSS score of less than 1 % suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote over the network via simple HTTP requests to exposed endpoints, meaning that any entity able to reach the Appsmith host can exploit the flaw without additional prerequisites.

Generated by OpenCVE AI on March 31, 2026 at 17:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Appsmith to version 1.98 or later.

Generated by OpenCVE AI on March 31, 2026 at 17:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Appsmith
Appsmith appsmith
Vendors & Products Appsmith
Appsmith appsmith

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Appsmith versions prior to 1.98 expose sensitive instance management API endpoints without authentication. Unauthenticated attackers can query endpoints like /api/v1/consolidated-api/view and /api/v1/tenants/current to retrieve configuration metadata, license information, and unsalted SHA-256 hashes of admin email domains for reconnaissance and targeted attack planning.
Title Appsmith < 1.98 Unauthenticated Instance Configuration Disclosure via Management APIs
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Appsmith Appsmith
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-27T19:57:26.175Z

Reserved: 2026-03-27T15:24:06.751Z

Link: CVE-2026-34411

cve-icon Vulnrichment

Updated: 2026-03-27T18:49:27.997Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T17:16:30.527

Modified: 2026-03-31T16:26:41.550

Link: CVE-2026-34411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:01:01Z

Weaknesses