Home

Description

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.30, NocoBase plugin-workflow-sql substitutes template variables directly into raw SQL strings via getParsedValue() without parameterization or escaping. Any user who triggers a workflow containing a SQL node with template variables from user-controlled data can inject arbitrary SQL. This issue has been patched in version 2.0.30.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




HIGH: 8.5CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 2.0.30
affected

References

github.com/...cobase/security/advisories/GHSA-vx58-fwwq-5g8j exploit

github.com/...cobase/security/advisories/GHSA-vx58-fwwq-5g8j

github.com/...ommit/75da3dddc4aba739c398f7072725dcf7f5487f5c

github.com/nocobase/nocobase/releases/tag/v2.0.30

cve.org (CVE-2026-34825)

nvd.nist.gov (CVE-2026-34825)

Download JSON