Cyber Posture

CVE-2026-33955

HighPublic PoC

Published: 27 March 2026

Published
27 March 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0008 22.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33955 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Streetwriters Notesnook Desktop. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires filtering and sanitization of information prior to display, directly preventing stored XSS from unsafe rendering of attacker-controlled note headers via dangerouslySetInnerHTML.

prevent

Mandates validation of user inputs like note headers to block malicious XSS payloads from being stored in note history.

prevent

Enforces secure baseline configurations in Electron desktop apps, such as nodeIntegration: false and contextIsolation: true, to block XSS escalation to remote code execution during backup/restore.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204 User Execution Execution
An adversary may rely upon specific actions by a user in order to gain execution.
Why these techniques?

Stored XSS in Electron desktop app (nodeIntegration enabled) directly enables client-side exploitation for code execution (T1203) when user views malicious note history comparison (T1204), chaining to RCE via backup/restore.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop, a cross-site scripting vulnerability stored in the note history comparison viewer can escalate to remote code execution in a desktop application. The issue is triggered when an attacker-controlled note…

more

header is displayed using `dangerouslySetInnerHTML` without secure handling. When combined with the full backup and restore feature in the desktop application, this becomes remote code execution because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 patches the issue.

Deeper analysisAI

CVE-2026-33955 is a stored cross-site scripting (XSS) vulnerability, associated with CWE-79 and CWE-94, affecting Notesnook, an open-source note-taking application. The flaw impacts the Web and Desktop versions prior to 3.3.11, specifically in the note history comparison viewer. There, an attacker-controlled note header is rendered using React's `dangerouslySetInnerHTML` without secure sanitization, enabling XSS payload execution.

Exploitation requires a user to view a note history comparison containing a malicious note header crafted by the attacker, which triggers the XSS (CVSS v3.1: AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). In the Electron-based Desktop application, configured with `nodeIntegration: true` and `contextIsolation: false`, attackers can chain this with the full backup and restore feature to achieve remote code execution, granting high-impact confidentiality, integrity, and availability compromise following user interaction.

The official GitHub Security Advisory (GHSA-45g3-cv93-q59v) documents the issue, confirming that Notesnook version 3.3.11 patches the vulnerability by addressing the insecure rendering in the note history comparison viewer. Security practitioners should urge users to update to 3.3.11 or later and avoid restoring untrusted backups.

Details

CWE(s)

Affected Products

streetwriters
notesnook desktop
≤ 3.3.11

CVEs Like This One

CVE-2026-33976Same product: Streetwriters Notesnook Desktop
CVE-2026-40322Shared CWE-79, CWE-94
CVE-2025-55204Shared CWE-79, CWE-94
CVE-2026-34448Shared CWE-79, CWE-94
CVE-2026-34725Shared CWE-79, CWE-94
CVE-2026-42090Shared CWE-79, CWE-94
CVE-2026-39846Shared CWE-79, CWE-94
CVE-2026-34585Shared CWE-79, CWE-94
CVE-2026-23852Shared CWE-79, CWE-94
CVE-2025-66562Shared CWE-79, CWE-94

References