CVE-2026-34156
Published: 31 March 2026
Description
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However,…
more
the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28.
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation mandates timely patching of the NocoBase sandbox escape vulnerability fixed in version 2.0.28, directly eliminating the prototype chain traversal exploit.
Process isolation requires enforced separation between user-supplied JavaScript in the workflow script node and host Node.js processes, preventing sandbox escapes via exposed console stream objects.
Least privilege ensures the NocoBase process runs without root privileges, limiting the scope and impact of remote code execution achieved through sandbox escape.
Security SummaryAI
CVE-2026-34156 is a critical sandbox escape vulnerability in NocoBase, an AI-powered no-code/low-code platform for building business applications and enterprise solutions. The issue affects the Workflow Script Node prior to version 2.0.28, which executes user-supplied JavaScript within a Node.js vm sandbox protected by a custom require allowlist controlled by the WORKFLOW_SCRIPT_MODULES environment variable. However, the console object injected into the sandbox context exposes host-realm WritableWorkerStdio stream objects through console._stdout and console._stderr, enabling prototype chain traversal to bypass sandbox restrictions. The vulnerability carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-913.
An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting malicious JavaScript in a workflow script, the attacker traverses the prototype chain from the exposed console streams to access host-realm objects, escaping the sandbox and achieving remote code execution (RCE) as the root user running the NocoBase process.
The vulnerability has been patched in NocoBase version 2.0.28, as detailed in the project's security advisory (GHSA-px3p-vgh9-m57c), release notes, and associated pull request. Security practitioners should upgrade to 2.0.28 or later and review configurations of the WORKFLOW_SCRIPT_MODULES environment variable to ensure robust module restrictions.
NocoBase's AI-powered nature may amplify risks in environments leveraging its no-code workflows for automated business logic, though no public evidence of real-world exploitation has been reported.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: ai
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Enables exploitation of public-facing no-code platform (T1190) by injecting malicious JavaScript (T1059.007) to escape sandbox and escalate privileges to root RCE (T1068).