NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.30, NocoBase plugin-workflow-sql substitutes template variables directly into raw SQL strings via getParsedValue() without parameterization or escaping. Any user who triggers a workflow containing a SQL node with template variables from user-controlled data can inject arbitrary SQL. This issue has been patched in version 2.0.30.
References
| Link | Resource |
|---|---|
| https://github.com/nocobase/nocobase/commit/75da3dddc4aba739c398f7072725dcf7f5487f5c | Patch |
| https://github.com/nocobase/nocobase/releases/tag/v2.0.30 | Product Release Notes |
| https://github.com/nocobase/nocobase/security/advisories/GHSA-vx58-fwwq-5g8j | Exploit Mitigation Vendor Advisory |
| https://github.com/nocobase/nocobase/security/advisories/GHSA-vx58-fwwq-5g8j | Exploit Mitigation Vendor Advisory |
Configurations
History
10 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:nocobase:nocobase:*:*:*:*:*:*:*:* | |
| First Time |
Nocobase
Nocobase nocobase |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () https://github.com/nocobase/nocobase/commit/75da3dddc4aba739c398f7072725dcf7f5487f5c - Patch | |
| References | () https://github.com/nocobase/nocobase/releases/tag/v2.0.30 - Product, Release Notes | |
| References | () https://github.com/nocobase/nocobase/security/advisories/GHSA-vx58-fwwq-5g8j - Exploit, Mitigation, Vendor Advisory |
03 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/nocobase/nocobase/security/advisories/GHSA-vx58-fwwq-5g8j - |
02 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 20:16
Updated : 2026-04-10 15:16
NVD link : CVE-2026-34825
Mitre link : CVE-2026-34825
CVE.ORG link : CVE-2026-34825
JSON object : View
Products Affected
nocobase
- nocobase
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
