Description
NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, a blind Server-Side Request Forgery (SSRF) vulnerability exists in the `uploadViaURL` functionality due to an unprotected `HEAD` request. While the subsequent file retrieval logic correctly enforces SSRF protections, the initial metadata request executes without validation. This allows limited outbound requests to arbitrary URLs before SSRF controls are applied. Version 0.301.0 contains a patch for the issue.
Published: 2026-01-28
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

The vulnerability is an unvalidated HEAD request made by the uploadViaURL endpoint in NocoDB versions prior to 0.301.0. This blind Server‑Side Request Forgery allows an attacker to cause the server to send a HEAD request to any URL of the attacker’s choosing before the subsequent download step applies the intended SSRF controls. The attacker can therefore probe or contact arbitrary external services, potentially gathering information or leaking minimal metadata, but cannot directly retrieve data from those services. This weakness is categorized as CWE‑918.

Affected Systems

The flaw affects the NocoDB application developed by nocodb. All releases before version 0.301.0 are vulnerable. End‑users using these versions should consult the NocoDB documentation to apply the update or disable the affected feature.

Risk and Exploitability

The CVSS v3.1 score is 4.9, indicating moderate risk, and the EPSS score is below 1 percent, suggesting exploitation likelihood is very low. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to be able to invoke the uploadViaURL API endpoint, typically via authenticated or unauthenticated access to the web application, to exploit the unverified request. Because the subsequent download logic enforces SSRF restrictions, the attack surface is limited to non‑data‑exfiltration probing. Nonetheless, if the system reaches out to sensitive internal resources, the blind SSRF could be leveraged for reconnaissance or to trigger side‑effects.

Generated by OpenCVE AI on April 18, 2026 at 01:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NocoDB to version 0.301.0 or later
  • If an upgrade is not immediately feasible, disable or restrict the uploadViaURL functionality to trusted administrators only
  • Configure firewall or host‑based network policies to block outbound connections from the NocoDB server to untrusted destinations

Generated by OpenCVE AI on April 18, 2026 at 01:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xr7v-j379-34v9 NocoDB has Blind SSRF via Unvalidated HEAD Request in uploadViaURL Functionality
History

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*

Fri, 30 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Nocodb
Nocodb nocodb
Vendors & Products Nocodb
Nocodb nocodb

Wed, 28 Jan 2026 21:00:00 +0000

Type Values Removed Values Added
Description NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, a blind Server-Side Request Forgery (SSRF) vulnerability exists in the `uploadViaURL` functionality due to an unprotected `HEAD` request. While the subsequent file retrieval logic correctly enforces SSRF protections, the initial metadata request executes without validation. This allows limited outbound requests to arbitrary URLs before SSRF controls are applied. Version 0.301.0 contains a patch for the issue.
Title NocoDB has Blind SSRF via Unvalidated HEAD Request in uploadViaURL Functionality
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T18:01:24.369Z

Reserved: 2026-01-26T21:06:47.868Z

Link: CVE-2026-24767

cve-icon Vulnrichment

Updated: 2026-01-29T16:03:22.566Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T21:16:12.270

Modified: 2026-02-04T20:05:20.320

Link: CVE-2026-24767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:45:33Z

Weaknesses