Skip to main content

Changelog

Updates, changes, and improvements at Retool.

Refer to the stable and edge release notes for detailed information about self-hosted releases.

Retool now supports an integration to the Tavily Search API. Use this integration to perform either general or news-specific web searches. You can choose to provide your own Tavily API key if you do not want to be subject to Retool's rate limits (100 calls per 24 hours) on Tavily.

A vulnerability in an open-source library, samlify, which Retool uses for SAML login implementation, allowed for account takeovers through forged SAML identity provider (IdP) assertions. In the worst case, an external threat actor could forge arbitrary assertions for a SAML IdP, potentially leading to full account takeovers within an organization. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue. This exploit requires no user interaction and an attacker could gain unauthorized access to an organization with escalated privileges.

FieldValue
Vulnerability TypeImproper Verification of Cryptographic Signature
Packagesamlify
Affected ComponentRetool organizations using SAML SSO
Attack TypeRemote
ImpactAccount Takeover
Referencehttps://nvd.nist.gov/vuln/detail/CVE-2025-47949
DiscovererAlexander Tan (ahacker1)

Fixed release versions

BranchVersions
Edge3.207.0-edge
Stable3.196.2-stable
Stable3.148.13-stable
Stable3.114.25-stable

Affected release versions

Release branchRelease versions
Edge3.111.0 to 3.203.0
3.196-stable3.196.0 to 3.196.1
3.148-stable3.148.0 to 3.148.11
3.114-stable3.114.0 to 3.114.23
< 3.111.0

An improved version of the File Input component for Mobile is currently available to cloud instances and self-hosted instances on version 3.168.0 or later.

This includes:

  • Multi-file support – Users can now upload multiple files at once instead of being limited to a single file.
  • Blob URL exposure – The component now exposes blob URLs to the value property in the component state.

Self-hosted deployments of Retool missing the BASE_DOMAIN environment variable may in some cases be vulnerable to host header injections. All vulnerable versions can be remediated immediately by properly setting the BASE_DOMAIN environment variable to the full URL of the deployment, such as https://retool.example.com. Beginning with 3.196.0, this environment variable will be required for an instance on boot.

DisclosureDetails
Vulnerability TypeCWE-1289: Improper Validation of Unsafe Equivalence in Input.
Vendor of ProductRetool.
Affected Product Code BaseView affected release versions.
Affected ComponentSelf-hosted Retool organizations.
Attack TypeRemote.
ImpactEscalation of Privileges.
CVSS 3.x Base Score7.1
CVSS 3.x VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
CVSS 4.x Base Score5.3
CVSS 4.x VectorCVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/R:U
Referencehttps://docs.retool.com/releases
DiscovererRobinhood Red Team and Doyensec
Fixed Version3.196.0+

Is my version of Retool affected?

All current Retool on-prem instances that have not yet disabled password based authentication may be vulnerable (this is easily checked by verifying that there is no form to login with a password when opening up Retool.) If password auth has not been disabled, your Retool instance is potentially vulnerable if all of the following apply to you:

  • You do not have the BASE_DOMAIN environment variable set.
  • Your Retool instance is reachable without any request filtering based on the Host header. This is likely the case if you’re not using a reverse proxy or that reverse proxy forwards requests for all domains.
  • A user in your instance solely relies on password based authentication. This is the case when all of the following apply

Affected release versions

ReleaseRelease versions
3.183.18.1 to 3.18.23
3.203.20.1 to 3.20.18
3.223.22.1 to 3.22.21
3.243.24.1 to 3.24.22
3.263.26.4 to 3.26.14
3.283.28.3 to 3.28.15
3.303.30.1 to 3.30.15
3.323.32.1 to 3.32.12
3.333.33.1-stable to 3.33.37-stable
3.523.52.1-stable to 3.52.28-stable
3.753.75.1-stable to 3.75.25-stable
3.1143.114.1-stable to 3.114.22-stable
3.1483.148.1-stable to 3.148.22-stable

Notification Update: 2025-05-09

An email to customers sent on 2025-05-09 incorrectly described which Retool instances are affected. The section on affected versions should instead be Is my version of Retool affected?.

Improvements to source control on Workflows are now generally available on Self-hosted Retool 3.200.0-edge and in the upcoming stable release. The following features are now supported for all users on Enterprise plans:

Retool made several improvements to the usage of Source Control with Retool Workflows. The following features are now supported on Enterprise plans:

  • Branched changes. You can now make changes to workflows using branches. Previously, all Source Control changes on workflows were branchless.
  • Multi-element branching. You can make edits to workflows on the same branch as edits to apps, modules, and Query Library queries.
  • Collaborative branches. Multiple users can commit changes and merge pull requests on collaborative branches.

This feature was previously released as generally available for cloud instances and as closed beta for self-hosted instances.

Retool can record user behavior and interactions with apps using Fullstory. When enabled, data about user interactions with apps are reported directly to Fullstory for you to review in detail. You can then analyze app analytics, evaluate impact, and review interactions with session replay. This integration is useful for monitoring user activity across different apps, and using advanced analytical tools like heatmaps and funnels to identify usage patterns, debug errors, and improve the overall user experience.