CVE-2025-49017
Certain versions of self-hosted deployments of Retool are vulnerable to cross-site request forgery (CSRF/XSRF) attacks via manipulated Retool Apps. HTML forms embedded in Retool Apps by properly permissioned users can, when interacted with by other users, be used to change that users' email address and take over their account.
This issue has been fixed in the following Retool versions:
- 3.212.0-edge (released on May 29, 2025 at 9:07 am),
- 3.148.14-stable (released on May 28, 2025 at 3:40 pm),
- 3.196.4-stable (released on May 28, 2025 at 3:38 pm).
See the complete list of affected and fixed versions below.
We have no indications of this vulnerability being known publicly before this disclosure, nor any attacks or attempted attacks using the vulnerability. This vulnerability was reported to us privately first.
We will communicate further updates here, should such become necessary.
Disclosure | Details |
---|---|
Vulnerability Type | CWE-352: Cross-Site Request Forgery |
Vendor of Product | Retool |
Fixed Version | Edge: 3.212.0+; Stable: 3.148.14+, 3.196.4+ |
Affected Product Code Base | Edge: 3.123.0 to 3.207.0; Stable: 3.148.0 to 3.148.13, 3.196.0 to 3.196.3-stable |
Affected Component | Self-hosted Retool organizations |
Attack Type | Remote |
Impact | Escalation of Privileges |
CVSS 3.x Base Score | 4.8 |
CVSS 3.x Vector | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C |
CVSS 4.x Base Score | 4.3 |
CVSS 4.x Vector | CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:H/SA:N |
Reference | https://docs.retool.com/releases |
Discoverer | Robinhood Red Team and Doyensec |
Am I affected?
Customers who run self-hosted deployments of vulnerable Retool versions are affected. To mount an attack using this vulnerability an attacker needs to have (a user account with) permission to create or edit a Retool App, embed a malicious HTML form, and get a victim user to interact with it.
We have no indications of this vulnerability being known publicly before we fixed it, nor any attacks or attempted attacks using the vulnerability.
What are the mitigations?
The only available fix is to upgrade the Retool deployment to a fixed version. No other customer-controllable mitigations are available.
What is the impact?
Authenticated users under some circumstances (as described above) are able to take over other users' accounts if such users have interacted with a manipulated Retool App. Other account changing actions can be taken, but are generally less severe.
What are indicators of compromise (IOCs)?
Successful attacks will result in the email address of taken over accounts to be changed. Besides confirming that no user account in a Retool deployment has an unexpected email address, customers can also check for
- unexpected email change notifications being sent (to the previous email address), and
- email change events in the Retool audit logs.
What versions are affected?
Self-hosted Retool only.
Release branch | Release versions |
---|---|
Edge | 3.123.0 to 3.207.0 |
3.196-stable | 3.196.0 to 3.196.3 |
3.148-stable | 3.148.0 to 3.148.13 |
What versions contain the fix?
Self-hosted Retool only.
Branch | Versions |
---|---|
Edge | 3.212.0+ |
3.196-stable | 3.196.4+ |
3.148-stable | 3.148.14+ |
Stable | >=3.227 |