Skip to main content

Changelog

Updates, changes, and improvements at Retool.

7 posts tagged with "Disclosures"

View All Tags

CVE-2025-49017

Certain versions of self-hosted deployments of Retool are vulnerable to cross-site request forgery (CSRF/XSRF) attacks via manipulated Retool Apps. HTML forms embedded in Retool Apps by properly permissioned users can, when interacted with by other users, be used to change that users' email address and take over their account.

This issue has been fixed in the following Retool versions:

See the complete list of affected and fixed versions below.

We have no indications of this vulnerability being known publicly before this disclosure, nor any attacks or attempted attacks using the vulnerability. This vulnerability was reported to us privately first.

We will communicate further updates here, should such become necessary.

DisclosureDetails
Vulnerability TypeCWE-352: Cross-Site Request Forgery
Vendor of ProductRetool
Fixed VersionEdge: 3.212.0+; Stable: 3.148.14+, 3.196.4+
Affected Product Code BaseEdge: 3.123.0 to 3.207.0; Stable: 3.148.0 to 3.148.13, 3.196.0 to 3.196.3-stable
Affected ComponentSelf-hosted Retool organizations
Attack TypeRemote
ImpactEscalation of Privileges
CVSS 3.x Base Score4.8
CVSS 3.x VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C
CVSS 4.x Base Score4.3
CVSS 4.x VectorCVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:H/SA:N
Referencehttps://docs.retool.com/releases
DiscovererRobinhood Red Team and Doyensec

Am I affected?

Customers who run self-hosted deployments of vulnerable Retool versions are affected. To mount an attack using this vulnerability an attacker needs to have (a user account with) permission to create or edit a Retool App, embed a malicious HTML form, and get a victim user to interact with it.

We have no indications of this vulnerability being known publicly before we fixed it, nor any attacks or attempted attacks using the vulnerability.

What are the mitigations?

The only available fix is to upgrade the Retool deployment to a fixed version. No other customer-controllable mitigations are available.

What is the impact?

Authenticated users under some circumstances (as described above) are able to take over other users' accounts if such users have interacted with a manipulated Retool App. Other account changing actions can be taken, but are generally less severe.

What are indicators of compromise (IOCs)?

Successful attacks will result in the email address of taken over accounts to be changed. Besides confirming that no user account in a Retool deployment has an unexpected email address, customers can also check for

  • unexpected email change notifications being sent (to the previous email address), and
  • email change events in the Retool audit logs.

What versions are affected?

Self-hosted Retool only.

Release branchRelease versions
Edge3.123.0 to 3.207.0
3.196-stable3.196.0 to 3.196.3
3.148-stable3.148.0 to 3.148.13

What versions contain the fix?

Self-hosted Retool only.

BranchVersions
Edge3.212.0+
3.196-stable3.196.4+
3.148-stable3.148.14+
Stable>=3.227

July 2nd, 2025 Cloud vulnerability disclosure

Retool Cloud was vulnerable to an unauthenticated account takeover via the "Passwordless Login" feature. This could have been used to take over Retool user accounts in organizations using this feature. We successfully patched our cloud deployment for all customers on June 17th, 2025, at 2:26 PM PDT with no further action being required by customers. All potentially affected customers have been notified as of July 2nd, 2025.

There are no indications of this vulnerability being publicly known nor any attempts to exploit it before being patched. Thanks to Rens van der Linden from QUAYOUNG for responsibly and privately disclosing the vulnerability to us.

We will communicate further updates here, should such become necessary.

Overview

  • Who is affected?: Cloud customers whose users successfully used passwordless login without MFA enabled.
  • What are the mitigations?: No action required from you; we have deployed a fix to our cloud environment already. For an added layer of security, consider also enforcing MFA in your Retool organization.
  • What is the impact?: Potential account takeover in your Retool organization by unauthenticated outside users.
  • What are indicators of compromise?: Suspicious login events in audit logs, email notifications about suspicious logins from new IP addresses, unexpected magic login link emails.

Was my organization affected?

Organizations with passwordless login enabled and MFA enforcement disabled, or with individual accounts that did not have MFA activated, were vulnerable. Enforcing MFA on the organization level prevented this vulnerability from being exploitable, as did enabling MFA for individual accounts.

We were able to narrow down further which customers this was possible for and notified all customers that were potentially affected. Specifically, organizations with at least one user who successfully logged in using the passwordless login feature, and whose account at the time of such login did not have MFA enabled.

We have no indications of this vulnerability being known publicly before we fixed it, nor any attacks or attempted attacks using the vulnerability.

What steps has Retool taken to address the vulnerability?

A patch has already been deployed to Retool's Cloud environment. No action is required from you at this time, but we recommend enforcing MFA in your Retool organization for an extra layer of security.

What is the impact?

Prior to our fix, this vulnerability enabled unauthenticated users to take over accounts in your organization through the passwordless login feature.

What are indicators of compromise (IOCs)?

Retool audit logs will contain events for successful passwordless logins, which will always be emitted for any successful attack with this vulnerability. An unexpected successful passwordless login event after April 22, 2024 can indicate a compromise.

Additionally, malicious logins may be identified by correlating email notifications for logins from new IP addresses. Attempted attacks would be indicated by unexpected passwordless login request emails from Retool. Matching the timing of the emails to login event timestamps in Retool Cloud and checking with your users who received the email can be used to determine if the login is unexpected. Utilizing your email provider's search or vault functionality to bulk search for these IOCs is advised.

CVE-2025-47949

A vulnerability in an open-source library, samlify, which Retool uses for SAML login implementation, allowed for account takeovers through forged SAML identity provider (IdP) assertions. In the worst case, an external threat actor could forge arbitrary assertions for a SAML IdP, potentially leading to full account takeovers within an organization. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue. This exploit requires no user interaction and an attacker could gain unauthorized access to an organization with escalated privileges.

FieldValue
Vulnerability TypeImproper Verification of Cryptographic Signature
Packagesamlify
Affected ComponentRetool organizations using SAML SSO
Attack TypeRemote
ImpactAccount Takeover
Referencehttps://nvd.nist.gov/vuln/detail/CVE-2025-47949
DiscovererAlexander Tan (ahacker1)

Fixed release versions

BranchVersions
Edge3.207.0-edge
Stable3.196.2-stable
Stable3.148.13-stable
Stable3.114.25-stable

Affected release versions

Release branchRelease versions
Edge3.111.0 to 3.203.0
3.196-stable3.196.0 to 3.196.1
3.148-stable3.148.0 to 3.148.11
3.114-stable3.114.0 to 3.114.23
< 3.111.0

CVE-2025-47424

Self-hosted deployments of Retool missing the BASE_DOMAIN environment variable may in some cases be vulnerable to host header injections. All vulnerable versions can be remediated immediately by properly setting the BASE_DOMAIN environment variable to the full URL of the deployment, such as https://retool.example.com. Beginning with 3.196.0, this environment variable will be required for an instance on boot.

DisclosureDetails
Vulnerability TypeCWE-1289: Improper Validation of Unsafe Equivalence in Input.
Vendor of ProductRetool.
Affected Product Code BaseView affected release versions.
Affected ComponentSelf-hosted Retool organizations.
Attack TypeRemote.
ImpactEscalation of Privileges.
CVSS 3.x Base Score7.1
CVSS 3.x VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
CVSS 4.x Base Score5.3
CVSS 4.x VectorCVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/R:U
Referencehttps://docs.retool.com/releases
DiscovererRobinhood Red Team and Doyensec
Fixed Version3.196.0+

Is my version of Retool affected?

All current Retool on-prem instances that have not yet disabled password based authentication may be vulnerable (this is easily checked by verifying that there is no form to login with a password when opening up Retool.) If password auth has not been disabled, your Retool instance is potentially vulnerable if all of the following apply to you:

  • You do not have the BASE_DOMAIN environment variable set.
  • Your Retool instance is reachable without any request filtering based on the Host header. This is likely the case if you’re not using a reverse proxy or that reverse proxy forwards requests for all domains.
  • A user in your instance solely relies on password based authentication. This is the case when all of the following apply

Affected release versions

ReleaseRelease versions
3.183.18.1 to 3.18.23
3.203.20.1 to 3.20.18
3.223.22.1 to 3.22.21
3.243.24.1 to 3.24.22
3.263.26.4 to 3.26.14
3.283.28.3 to 3.28.15
3.303.30.1 to 3.30.15
3.323.32.1 to 3.32.12
3.333.33.1-stable to 3.33.37-stable
3.523.52.1-stable to 3.52.28-stable
3.753.75.1-stable to 3.75.25-stable
3.1143.114.1-stable to 3.114.22-stable
3.1483.148.1-stable to 3.148.22-stable

Notification Update: 2025-05-09

An email to customers sent on 2025-05-09 incorrectly described which Retool instances are affected. The section on affected versions should instead be Is my version of Retool affected?.

CVE-2025-29774 and CVE-2025-29775 (SAMLStorm)

A vulnerability in an open-source library, xml-crypto, which Retool uses for SAML login implementation, allowed for account takeovers through forged SAML identity provider (IdP) assertions. In the worst case, an external threat actor could forge arbitrary assertions for a SAML IdP, potentially leading to full account takeovers within an organization.

CVE-2024-42056

Certain versions of Self-hosted Retool for Enterprise between 3.18.1 and 3.40.0 insert resource authentication credentials into sent data. This could allow remote authenticated attackers to access resource authentication credentials for users with Use permissions via the /api/resources endpoint.

DisclosureDetails
Vulnerability TypeInsertion of Sensitive Information Into Sent Data.
Vendor of ProductRetool.
Affected Product Code BaseView affected release versions.
Affected ComponentSelf-hosted Retool organizations on Enterprise plan.
Attack TypeRemote.
ImpactInformation Disclosure.
Referencehttps://docs.retool.com/releases
DiscovererAnubhav Sharma. This vulnerability was also independently discovered by 6mile

Affected release versions

ReleaseRelease versions
3.183.18.1 to 3.18.23
3.203.20.1 to 3.20.18
3.223.22.1 to 3.22.21
3.243.24.1 to 3.24.22
3.263.26.4 to 3.26.14
3.283.28.3 to 3.28.15
3.303.30.1 to 3.30.15
3.323.32.1 to 3.32.12
3.333.33.1-stable to 3.33.18-stable
3.363.36.0-edge to 3.36.1-edge
3.373.37.0-edge
3.383.38.0-edge
3.393.39.0-edge
3.403.40.0-edge

CVE-2024-3094

Retool is aware of CVE-2024-3094, a backdoor affecting versions 5.6.0 and 5.6.1 of xz-utils. Self-hosted Retool images are not affected, and no action is required. Retool Cloud infrastructure and services are not impacted.

If you have any questions or concerns, please reach out to security@retool.com.