Home

Description

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.39, the queryParentSQL() function in the core database package constructs a recursive CTE query by joining nodeIds with string concatenation instead of using parameterized queries. The nodeIds array contains primary key values read from database rows. An attacker who can create a record with a malicious string primary key can inject arbitrary SQL when any subsequent request triggers recursive eager loading on that collection. This issue has been patched in version 2.0.39.

PUBLISHED Reserved 2026-04-21 | Published 2026-05-07 | Updated 2026-05-07 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 2.0.39
affected

References

github.com/...cobase/security/advisories/GHSA-4948-f92q-f432 exploit

github.com/...cobase/security/advisories/GHSA-4948-f92q-f432

github.com/nocobase/nocobase/pull/9133

github.com/...ommit/202e2b8efe44ba90adbf1087f6f70881ff947604

github.com/nocobase/nocobase/releases/tag/v2.0.39

cve.org (CVE-2026-41640)

nvd.nist.gov (CVE-2026-41640)

Download JSON