Description
NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an authenticated user with org-level-creator permissions can exploit prototype pollution in the `/api/v2/meta/connection/test` endpoint, causing all database write operations to fail application-wide until server restart. While the pollution technically bypasses SUPER_ADMIN authorization checks, no practical privileged actions can be performed because database operations fail immediately after pollution. Version 0.301.0 patches the issue.
Published: 2026-01-28
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service caused by prototype pollution that disables all database write operations
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a prototype pollution flaw in the /api/v2/meta/connection/test endpoint that can be triggered by an authenticated user with org‑level‑creator permissions. After the pollution occurs, every database write operation fails across the entire application until the server is restarted, effectively preventing data persistence. The weakness is classified as CWE‑1321.

Affected Systems

NocoDB, software used for building databases as spreadsheets. All versions running before 0.301.0 are affected, regardless of environment or deployment. The vulnerability does not affect other vendors or unrelated products.

Risk and Exploitability

The CVSS score of 4.9 places it in the low severity range, and the EPSS score of less than 1% indicates a very low but non‑zero likelihood of exploitation in the wild. NocoDB is not currently listed in the CISA KEV catalog. An attacker must authenticate as an org‑level‑creator, which limits the attack surface; however, once authenticated, the attacker can cause a denial of service by corrupting prototype data, requiring a server restart to regain normal operation.

Generated by OpenCVE AI on April 18, 2026 at 01:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NocoDB to version 0.301.0 or later where the prototype pollution is fixed.
  • Revoke org‑level‑creator permissions for users who do not require them and enforce stricter role‑based access controls.
  • Monitor application and HTTP logs for frequent or abnormal use of the /api/v2/meta/connection/test endpoint and apply rate limiting or temporary blocking if suspicious activity is detected.

Generated by OpenCVE AI on April 18, 2026 at 01:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-95ff-46g6-6gw9 NocoDB has Prototype Pollution in Connection Test Endpoint, Leading to DoS
History

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*

Fri, 30 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Nocodb
Nocodb nocodb
Vendors & Products Nocodb
Nocodb nocodb

Wed, 28 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
Description NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an authenticated user with org-level-creator permissions can exploit prototype pollution in the `/api/v2/meta/connection/test` endpoint, causing all database write operations to fail application-wide until server restart. While the pollution technically bypasses SUPER_ADMIN authorization checks, no practical privileged actions can be performed because database operations fail immediately after pollution. Version 0.301.0 patches the issue.
Title NocoDB Vulnerable to Prototype Pollution in Connection Test Endpoint, Leading to DoS
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T18:01:30.160Z

Reserved: 2026-01-26T21:06:47.868Z

Link: CVE-2026-24766

cve-icon Vulnrichment

Updated: 2026-01-29T16:03:36.099Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T21:16:12.103

Modified: 2026-02-04T20:06:08.177

Link: CVE-2026-24766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:45:33Z

Weaknesses