Cyber Posture

CVE-2026-34156

CriticalPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.2740 96.4th percentile
Risk Priority 36 60% EPSS · 20% KEV · 20% CVSS

Description

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However,…

more

the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation mandates timely patching of the NocoBase sandbox escape vulnerability fixed in version 2.0.28, directly eliminating the prototype chain traversal exploit.

prevent

Process isolation requires enforced separation between user-supplied JavaScript in the workflow script node and host Node.js processes, preventing sandbox escapes via exposed console stream objects.

prevent

Least privilege ensures the NocoBase process runs without root privileges, limiting the scope and impact of remote code execution achieved through sandbox escape.

Security SummaryAI

CVE-2026-34156 is a critical sandbox escape vulnerability in NocoBase, an AI-powered no-code/low-code platform for building business applications and enterprise solutions. The issue affects the Workflow Script Node prior to version 2.0.28, which executes user-supplied JavaScript within a Node.js vm sandbox protected by a custom require allowlist controlled by the WORKFLOW_SCRIPT_MODULES environment variable. However, the console object injected into the sandbox context exposes host-realm WritableWorkerStdio stream objects through console._stdout and console._stderr, enabling prototype chain traversal to bypass sandbox restrictions. The vulnerability carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-913.

An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting malicious JavaScript in a workflow script, the attacker traverses the prototype chain from the exposed console streams to access host-realm objects, escaping the sandbox and achieving remote code execution (RCE) as the root user running the NocoBase process.

The vulnerability has been patched in NocoBase version 2.0.28, as detailed in the project's security advisory (GHSA-px3p-vgh9-m57c), release notes, and associated pull request. Security practitioners should upgrade to 2.0.28 or later and review configurations of the WORKFLOW_SCRIPT_MODULES environment variable to ensure robust module restrictions.

NocoBase's AI-powered nature may amplify risks in environments leveraging its no-code workflows for automated business logic, though no public evidence of real-world exploitation has been reported.

Details

CWE(s)

Affected Products

nocobase
nocobase
≤ 2.0.28

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: ai

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Enables exploitation of public-facing no-code platform (T1190) by injecting malicious JavaScript (T1059.007) to escape sandbox and escalate privileges to root RCE (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References