A critical security vulnerability has been identified in Appsmith, a widely used open-source platform for building internal tools such as dashboards and administrative panels. Tracked as CVE-2026-24042, the flaw carries a critical CVSS score of 9.4 and poses serious risks to organizations that rely on Appsmith for rapid application development. Appsmith enables developers to connect databases, define business logic, and design interfaces through a low-code approach, often exposing applications to end users. Due to improper handling of public application execution states, the vulnerability may expose sensitive logic and development data to unauthenticated users across publicly accessible deployments. The issue stems from a viewMode confusion error within Appsmith’s request handling logic. In normal operation, publicly shared applications should restrict unauthenticated users to executing only actions that have been explicitly published. Researchers discovered that this boundary was not strictly enforced. By sending a crafted POST request to ‘/api/v1/actions/execute’ with ‘viewMode' set to ‘false’, or ‘omitting’ the parameter entirely, attackers could force the platform to execute edit-mode actions. These unpublished actions often include raw queries, internal APIs, or experimental logic intended solely for development. Exploitation allows unauthorized execution, potential reading or modification of development data sources, triggering of write operations or external API calls, and leakage of sensitive information embedded in unpublished workflows, fundamentally undermining application isolation. This vulnerability affects Appsmith applications that are published and made publicly accessible, particularly version 1.94. The Appsmith team has released a fix in version 1.95 and later, closing the execution boundary bypass. Organizations should upgrade immediately, review publicly exposed apps, and restrict unauthenticated access where unnecessary. Regular security testing, strict separation between development and production logic, and careful validation of execution modes are essential to preventing similar authorization flaws and protecting internal tooling environments from abuse during future releases and operational changes across distributed teams globally.
A high-severity security vulnerability has been disclosed in OpenClaw (formerly Clawdbot/Moltbot) that enables remote code execution (RCE) through a single malicious link. Tracked ...
A newly formed Russian hacker alliance calling itself Russian Legion has launched a coordinated cyberattack campaign against Denmark, marking a notable escalation in state-aligned ...
Fraudulent High-Yield Investment Programs (HYIPs) are rapidly spreading worldwide, promising “assured” profits that no genuine investment model can realistically deliver. These...