Appsmith vs Weaviate
Side-by-side trajectory, velocity, and editorial themes.
Appsmith spent six months in a sustained security-patch cycle, capped by a release with 15+ named advisories.
Appsmith's recent release stream is dominated by security work. v1.99 alone landed roughly fifteen security-tagged fixes — multiple named GHSAs (super-user race condition, SSRF via send-test-email, OAuth2 callback ACL bypass, application snapshot delete permission, expanded metadata denylist), critical CVE patches (CVE-2025-70952, CVE-2026-33937 in handlebars, CVE-2026-22732 around Spring Security headers), AQL injection prevention in the ArangoDB plugin, and several reflected XSS and email-normalization fixes. The same pattern repeats in v1.98 (SQL injection in UQI filters, simple-git critical CVE), v1.96 (arbitrary file write outside repo scope, OS command injection in in-memory Git, XSS in Table HTML cells), and earlier. Feature work continues alongside but at a much smaller volume — Redis TLS, BetterBugs SDK, Favorite Applications V2, Helm extraVolumes.
The arc is clear: Appsmith is absorbing the output of what looks like a sustained external audit (or several converging ones) and using minor releases as the patch vehicle. The diversity of vuln classes across the ArangoDB plugin, Spring Security headers, OAuth2 callback, in-memory Git, snapshot deletion permissions, and metadata denylist points to a broad-surface review rather than a single component. Feature work isn't stalled, but it's clearly running second to the security queue.
Expect at least one or two more 1.9x releases to keep landing security patches before a 2.0 line emerges. Watch for a release that bundles fewer security items than features — that's the signal the audit cycle has caught up. Likely product-side bets are continued data-source TLS coverage and more granular permission scoping (the GHSAs around snapshots and OAuth2 lookup suggest the permission model is being tightened systematically).
Weaviate is rebuilding around agent memory and MCP, not just vector storage.
Weaviate's recent feed is anchored by two strategic releases: the 1.37 release with a built-in MCP Server, Diversity Search, and Query Profiling, and Engram — a managed memory service for agents. Surrounding work makes the AI-native database real on more clouds (Shared Cloud GA on AWS US-East and Europe) and surfaces (C# managed client, hybrid-search tokenization improvements). Engineering blogs lean into RAG quality and multimodal embeddings.
The product is rotating from 'vector database' positioning toward 'memory and retrieval substrate for AI agents.' The combination of MCP server in core, Engram as a managed offering, and dogfooding inside Claude Code suggests agent memory is the next category Weaviate intends to own — distinct from raw vector storage, where Pinecone and Pgvector continue to crowd the market.
Expect Engram to expand integrations beyond Claude Code (Cursor, Cline, custom agent frameworks) and a clearer pricing surface for memory-as-a-service. The MCP server in 1.37 should evolve from preview to GA with curated tool catalogs.
See more alternatives to Appsmith →
See more alternatives to Weaviate →