NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28.
References
| Link | Resource |
|---|---|
| https://github.com/nocobase/nocobase/pull/8967 | Issue Tracking Patch |
| https://github.com/nocobase/nocobase/releases/tag/v2.0.28 | Product Release Notes |
| https://github.com/nocobase/nocobase/security/advisories/GHSA-px3p-vgh9-m57c | Exploit Mitigation Vendor Advisory |
Configurations
History
07 Apr 2026, 20:57
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Nocobase
Nocobase nocobase |
|
| CPE | cpe:2.3:a:nocobase:nocobase:*:*:*:*:*:*:*:* | |
| References | () https://github.com/nocobase/nocobase/pull/8967 - Issue Tracking, Patch | |
| References | () https://github.com/nocobase/nocobase/releases/tag/v2.0.28 - Product, Release Notes | |
| References | () https://github.com/nocobase/nocobase/security/advisories/GHSA-px3p-vgh9-m57c - Exploit, Mitigation, Vendor Advisory |
31 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 14:16
Updated : 2026-04-07 20:57
NVD link : CVE-2026-34156
Mitre link : CVE-2026-34156
CVE.ORG link : CVE-2026-34156
JSON object : View
Products Affected
nocobase
- nocobase
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources
