Impact
The vulnerability lies in the createSafeConsole function of nocobase plugin-workflow-javascript, present in versions up to 2.0.23. An attacker can manipulate input to break out of the JavaScript sandbox, gaining the ability to execute arbitrary code on the host. This results in loss of confidentiality, integrity, and availability, essentially Remote Code Execution.
Affected Systems
The affected product is nocobase plugin-workflow-javascript, versions 0.x through 2.0.23 inclusive. Systems running these versions are vulnerable.
Risk and Exploitability
The CVSS score is 6.9, indicating a moderate to high severity. No EPSS score is available and the vulnerability is not listed in KEV. The exploit is publicly available and can be launched remotely, making the risk significant. Attackers can craft arbitrary payloads to escape the sandbox, potentially compromising the entire server environment.
OpenCVE Enrichment