CVE-2024-55964
Published: 26 March 2025
Summary
CVE-2024-55964 is a critical-severity Code Injection (CWE-94) vulnerability in Appsmith Appsmith. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates and sanitizes user-supplied queries executed against the misconfigured PostgreSQL datasource, directly preventing crafted inputs from achieving remote command execution.
Enforces secure configuration settings for the embedded PostgreSQL instance in the Appsmith Docker container to block command execution capabilities.
Identifies and remediates the specific flaw in Appsmith versions before 1.52 by applying vendor updates that fix the PostgreSQL misconfiguration.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote code execution flaw in a public-facing web application (Appsmith), directly enabling T1190 for exploitation of public-facing apps; successful exploitation grants arbitrary command execution inside the Linux-based Docker container, mapping to T1059.004 Unix Shell.
NVD Description
An issue was discovered in Appsmith before 1.52. An incorrectly configured PostgreSQL instance in the Appsmith image leads to remote command execution inside the Appsmith Docker container. The attacker must be able to access Appsmith, login to it, create a…
more
datasource, create a query against that datasource, and execute that query.
Deeper analysisAI
CVE-2024-55964 is a remote command execution vulnerability (CWE-94) affecting Appsmith versions before 1.52. The issue arises from an incorrectly configured PostgreSQL instance embedded in the Appsmith Docker container image, enabling arbitrary command execution within the container. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-03-26T20:15:21.373.
Exploitation requires an attacker to access the Appsmith instance, log in, create a datasource, craft a query against that datasource, and execute it. Successful exploitation grants remote command execution inside the Appsmith Docker container, potentially allowing high confidentiality, integrity, and availability impacts.
Mitigation details are available in the official security advisory at https://github.com/appsmithorg/appsmith/security/advisories/GHSA-m95x-4w54-gc83.
Details
- CWE(s)