Skip to main content

Changelog

Updates, changes, and improvements at Retool.

Refer to the stable and edge release notes for detailed information about self-hosted releases.

Retool recently discovered a bug in certain versions of self-hosted Retool that affects SAML logins. This issue can occur after upgrading from an earlier version of self-hosted Retool to one of following affected versions:

ChannelAffected versions
Stable3.148.12-stable
Stable3.114.24-stable

Retool has released 3.148.13 and 3.114.24 on the Stable channel which resolves the issue.

If you have a deployment that currently runs an earlier version of self-hosted Retool, do not upgrade to an affected version.

Retool recently made changes that make it easier to review changes in source control. Retool now separates system-generated updates related to version upgrades into their own migration commit, so your pull requests are cleaner and easier to understand.

This feature is generally available on Retool Cloud. It is available in private beta to Self-hosted Retool organizations on edge version 3.203.0-edge or later, and will be generally available in an upcoming stable release. Self-hosted Retool organizations can reach out to support to enable this feature.

What's new

Instead of bundling migration changes with user changes, they now appear in a dedicated commit.

No setup needed—this happens automatically when you make commits.

This migration commit is required to ensure compatibility with the latest Retool features. Please do not revert or modify it.

Retool now supports an integration to the Tavily Search API. Use this integration to perform either general or news-specific web searches. You can choose to provide your own Tavily API key if you do not want to be subject to Retool's rate limits (100 calls per 24 hours) on Tavily.

A vulnerability in an open-source library, samlify, which Retool uses for SAML login implementation, allowed for account takeovers through forged SAML identity provider (IdP) assertions. In the worst case, an external threat actor could forge arbitrary assertions for a SAML IdP, potentially leading to full account takeovers within an organization. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue. This exploit requires no user interaction and an attacker could gain unauthorized access to an organization with escalated privileges.

FieldValue
Vulnerability TypeImproper Verification of Cryptographic Signature
Packagesamlify
Affected ComponentRetool organizations using SAML SSO
Attack TypeRemote
ImpactAccount Takeover
Referencehttps://nvd.nist.gov/vuln/detail/CVE-2025-47949
DiscovererAlexander Tan (ahacker1)

Fixed release versions

BranchVersions
Edge3.207.0-edge
Stable3.196.2-stable
Stable3.148.13-stable
Stable3.114.25-stable

Affected release versions

Release branchRelease versions
Edge3.111.0 to 3.203.0
3.196-stable3.196.0 to 3.196.1
3.148-stable3.148.0 to 3.148.11
3.114-stable3.114.0 to 3.114.23
< 3.111.0

An improved version of the File Input component for Mobile is currently available on Retool Cloud and on Self-hosted Retool 3.168.0 or later.

This includes:

  • Multi-file support – Users can now upload multiple files at once instead of being limited to a single file.
  • Blob URL exposure – The component now exposes blob URLs to the value property in the component state.

Self-hosted deployments of Retool missing the BASE_DOMAIN environment variable may in some cases be vulnerable to host header injections. All vulnerable versions can be remediated immediately by properly setting the BASE_DOMAIN environment variable to the full URL of the deployment, such as https://retool.example.com. Beginning with 3.196.0, this environment variable will be required for an instance on boot.

DisclosureDetails
Vulnerability TypeCWE-1289: Improper Validation of Unsafe Equivalence in Input.
Vendor of ProductRetool.
Affected Product Code BaseView affected release versions.
Affected ComponentSelf-hosted Retool organizations.
Attack TypeRemote.
ImpactEscalation of Privileges.
CVSS 3.x Base Score7.1
CVSS 3.x VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
CVSS 4.x Base Score5.3
CVSS 4.x VectorCVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/R:U
Referencehttps://docs.retool.com/releases
DiscovererRobinhood Red Team and Doyensec
Fixed Version3.196.0+

Is my version of Retool affected?

All current Retool on-prem instances that have not yet disabled password based authentication may be vulnerable (this is easily checked by verifying that there is no form to login with a password when opening up Retool.) If password auth has not been disabled, your Retool instance is potentially vulnerable if all of the following apply to you:

  • You do not have the BASE_DOMAIN environment variable set.
  • Your Retool instance is reachable without any request filtering based on the Host header. This is likely the case if you’re not using a reverse proxy or that reverse proxy forwards requests for all domains.
  • A user in your instance solely relies on password based authentication. This is the case when all of the following apply

Affected release versions

ReleaseRelease versions
3.183.18.1 to 3.18.23
3.203.20.1 to 3.20.18
3.223.22.1 to 3.22.21
3.243.24.1 to 3.24.22
3.263.26.4 to 3.26.14
3.283.28.3 to 3.28.15
3.303.30.1 to 3.30.15
3.323.32.1 to 3.32.12
3.333.33.1-stable to 3.33.37-stable
3.523.52.1-stable to 3.52.28-stable
3.753.75.1-stable to 3.75.25-stable
3.1143.114.1-stable to 3.114.22-stable
3.1483.148.1-stable to 3.148.22-stable

Notification Update: 2025-05-09

An email to customers sent on 2025-05-09 incorrectly described which Retool instances are affected. The section on affected versions should instead be Is my version of Retool affected?.

Improvements to source control on Workflows are now generally available on Self-hosted Retool 3.200.0-edge and in the upcoming stable release. The following features are now supported for all users on Enterprise plans:

Retool made several improvements to the usage of Source Control with Retool Workflows. The following features are now supported on Enterprise plans:

  • Branched changes. You can now make changes to workflows using branches. Previously, all Source Control changes on workflows were branchless.
  • Multi-element branching. You can make edits to workflows on the same branch as edits to apps, modules, and Query Library queries.
  • Collaborative branches. Multiple users can commit changes and merge pull requests on collaborative branches.

This feature was previously released as generally available on Retool Cloud and as private beta for Self-hosted organizations.