Description
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28.
Published: 2026-03-31
Score: 10 Critical
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates from the Workflow Script Node in NocoBase, a low‑code platform. The node executes user‑supplied JavaScript in a Node.js VM that deliberately limits module access with a custom require allowlist. However, the sandbox receives a console object that contains writable stream references (console._stdout, console._stderr). An attacker who has authenticated access can navigate the prototype chain of this object, reach those host‑realm WritableWorkerStdio streams, and thereby escape the sandbox. The escape grants the attacker unrestricted code execution with root privileges, leading to a complete compromise of the underlying host system.

Affected Systems

NocoBase deployments running any version older than 2.0.28 are affected. The flaw is present in the Workflow Script Node component of the platform. Users with authenticated accounts that can create or run workflow scripts are required to exploit the issue. All installations of NocoBase, regardless of hosting environment, that have not applied the 2.0.28 update remain vulnerable.

Risk and Exploitability

The issue carries a CVSS score of 10.0, indicating maximum severity. No EPSS score is publicly available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires valid authentication to the application and the ability to trigger a workflow that includes a script node. Once the sandbox escape is achieved, the attacker gains root level access to the host machine, making the risk extreme for any exposed deployment.

Generated by OpenCVE AI on March 31, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NocoBase to version 2.0.28 or later to remove the console object exposure.

Generated by OpenCVE AI on March 31, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-px3p-vgh9-m57c NocoBase Affected by Sandbox Escape to RCE via console._stdout Prototype Chain Traversal in Workflow Script Node
History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Nocobase
Nocobase nocobase
Vendors & Products Nocobase
Nocobase nocobase

Tue, 31 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28.
Title NocoBase Affected by Sandbox Escape to RCE via console._stdout Prototype Chain Traversal in Workflow Script Node
Weaknesses CWE-913
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Nocobase Nocobase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T13:33:11.325Z

Reserved: 2026-03-25T20:12:04.196Z

Link: CVE-2026-34156

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-31T14:16:12.170

Modified: 2026-03-31T14:16:12.170

Link: CVE-2026-34156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:38:38Z

Weaknesses