Cyber Posture

CVE-2026-34156

CriticalPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.1096 93.4th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2026-34156 is a critical sandbox escape vulnerability in NocoBase, an AI-powered no-code/low-code platform for building business applications and enterprise solutions. The issue affects the Workflow Script Node prior to version 2.0.28, which executes user-supplied JavaScript within a Node.js vm sandbox protected by a custom require allowlist controlled by the WORKFLOW_SCRIPT_MODULES environment variable. However, the console object injected into the sandbox context exposes host-realm WritableWorkerStdio stream objects through console._stdout and console._stderr, enabling prototype chain traversal to bypass sandbox restrictions. The vulnerability carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-913.

An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting malicious JavaScript in a workflow script, the attacker traverses the prototype chain from the exposed console streams to access host-realm objects, escaping the sandbox and achieving remote code execution (RCE) as the root user running the NocoBase process.

The vulnerability has been patched in NocoBase version 2.0.28, as detailed in the project's security advisory (GHSA-px3p-vgh9-m57c), release notes, and associated pull request. Security practitioners should upgrade to 2.0.28 or later and review configurations of the WORKFLOW_SCRIPT_MODULES environment variable to ensure robust module restrictions.

NocoBase's AI-powered nature may amplify risks in environments leveraging its no-code workflows for automated business logic, though no public evidence of real-world exploitation has been reported.

Details

CWE(s)
CWE-913

Affected Products

nocobase
nocobase
≤ 2.0.28

AI Security Analysis

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: ai

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Enables exploitation of public-facing no-code platform (T1190) by injecting malicious JavaScript (T1059.007) to escape sandbox and escalate privileges to root RCE (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References