Cyber Posture

CVE-2026-21853

HighPublic PoCRCEUpdated

Published: 02 March 2026

Published
02 March 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0029 52.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21853 is a high-severity Code Injection (CWE-94) vulnerability in Affine Affine. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 47.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents code injection by requiring validation and sanitization of specially crafted affine: URL inputs processed by AFFiNE's custom handler.

prevent

Mitigates the vulnerability through timely flaw remediation by patching AFFiNE to version 0.25.4 or later where the unsafe URL processing was fixed.

preventdetect

Provides defense-in-depth by deploying malicious code protection mechanisms to block or detect arbitrary code execution resulting from the exploited URL handler.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The vulnerability is a remote code execution in AFFiNE's custom URL handler, directly enabling exploitation of client software for arbitrary code execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.25.4, there is a one-click remote code execution vulnerability. This vulnerability can be exploited by embedding a specially crafted affine: URL on a website. An attacker can…

more

trigger the vulnerability in two common scenarios: 1/ A victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or 2/ A victim clicks on a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes AFFiNE custom URL handler, which launches the AFFiNE app and processes the crafted URL. This results in arbitrary code execution on the victim’s machine, without further interaction. This issue has been patched in version 0.25.4.

Deeper analysisAI

CVE-2026-21853 is a remote code execution vulnerability affecting AFFiNE, an open-source all-in-one workspace and operating system, in versions prior to 0.25.4. The flaw stems from improper handling of specially crafted "affine:" URLs by AFFiNE's custom URL handler, classified under CWE-94 (Code Injection). It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for network-based exploitation with low complexity and no privileges required.

Attackers can exploit this vulnerability without authentication by embedding a malicious "affine:" URL on a website. In one scenario, a victim visits an attacker-controlled site that automatically redirects to the URL; in another, the victim clicks a crafted link in user-generated content on a legitimate site. Either action triggers the victim's browser to invoke AFFiNE's handler, launching the app and processing the URL, resulting in arbitrary code execution on the victim's machine with no further interaction needed.

The vulnerability has been patched in AFFiNE version 0.25.4. The official security advisory (GHSA-67vm-2mcj-8965) and related pull request (#13864) on the project's GitHub repository detail the fix, implemented via commit c9a4129a3e9376b688c18e1dcd6c87a775caac80, which addresses the unsafe URL processing logic. Security practitioners should urge users to update to 0.25.4 or later and advise caution with "affine:" links from untrusted sources.

Details

CWE(s)

Affected Products

affine
affine
≤ 0.25.4

CVEs Like This One

CVE-2024-57061Shared CWE-94
CVE-2024-43767Shared CWE-94
CVE-2025-27678Shared CWE-94
CVE-2024-56448Shared CWE-94
CVE-2025-25467Shared CWE-94
CVE-2026-0500Shared CWE-94
CVE-2025-67744Shared CWE-94
CVE-2026-43874Shared CWE-94
CVE-2025-51387Shared CWE-94
CVE-2025-59041Shared CWE-94

References