Android RCE (CVE-2026-33976)
CVE-2026-33976
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the deskto...
Overview
A critical security vulnerability, tracked as CVE-2026-33976, has been discovered in the Notesnook note-taking application. This flaw allows an attacker to execute arbitrary code on a user’s desktop system by exploiting a weakness in how the app processes web clips. The vulnerability is present in versions prior to 3.3.11 for Web/Desktop and prior to 3.3.17 for Android/iOS.
Vulnerability Details
The root cause is a stored Cross-Site Scripting (XSS) vulnerability in the Web Clipper feature. When a user clips a webpage, Notesnook improperly preserves attacker-controlled attributes (like onload or onclick) from the source page’s HTML. This malicious code is stored within the note.
When the user later opens the infected note, Notesnook renders the HTML content inside an iframe that shares the full security context of the main Notesnook application. This allows the attacker’s script to run with the same privileges as the app itself. In the desktop application, which is built on Electron, this is particularly dangerous due to insecure configuration settings (nodeIntegration: true and contextIsolation: false), enabling the XSS to escalate to full remote code execution on the host system.
Impact
The impact of this vulnerability is severe (CVSS score: 9.6). A successful exploit could allow a remote attacker to:
- Execute arbitrary code on a victim’s computer with the privileges of the Notesnook application.
- Install malware, steal sensitive data, or gain persistent access to the system.
- Potentially move laterally within a network if the compromised system is part of one.
The attack vector is practical, as it only requires a user to clip a maliciously crafted webpage and later view the resulting note.
Remediation and Mitigation
The vendor has released patched versions that address this vulnerability. All users must update immediately.
Action Required:
- Update Notesnook: Upgrade to version 3.3.11 or later for Web/Desktop platforms, and version 3.3.17 or later for Android/iOS. Updates should be obtained through official channels (the Notesnook website, official app stores).
- Review Clipped Content: Exercise caution when using the Web Clipper feature on untrusted websites until the update is applied.
- General Security Hygiene: This incident underscores the importance of timely software updates. As seen in other high-profile cases, like the Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access, delaying patches can lead to significant compromise. Similarly, the risks of executing untrusted code highlight why platforms enforce security measures, such as Google’s 24-Hour Sideloading Wait to Combat Android Malware. For developers, this is a reminder to follow secure coding practices for web content isolation, a topic also relevant in the context of AI frameworks as discussed in LangChain, LangGraph Flaws Expose AI Systems - CISA Warns of Active Exploitation.
No viable workarounds exist besides applying the official patch. Users who cannot update immediately should consider disabling or avoiding the Web Clipper feature.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the ...
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_stock.php file via the "msg" parameter. The applic...
AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, AnythingLLM Desktop contains a Streaming Phase XSS vu...
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...