Critical (9.6)

Android RCE (CVE-2026-33976)

CVE-2026-33976

Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the deskto...

Overview

A critical security vulnerability, tracked as CVE-2026-33976, has been discovered in the Notesnook note-taking application. This flaw allows an attacker to execute arbitrary code on a user’s desktop system by exploiting a weakness in how the app processes web clips. The vulnerability is present in versions prior to 3.3.11 for Web/Desktop and prior to 3.3.17 for Android/iOS.

Vulnerability Details

The root cause is a stored Cross-Site Scripting (XSS) vulnerability in the Web Clipper feature. When a user clips a webpage, Notesnook improperly preserves attacker-controlled attributes (like onload or onclick) from the source page’s HTML. This malicious code is stored within the note.

When the user later opens the infected note, Notesnook renders the HTML content inside an iframe that shares the full security context of the main Notesnook application. This allows the attacker’s script to run with the same privileges as the app itself. In the desktop application, which is built on Electron, this is particularly dangerous due to insecure configuration settings (nodeIntegration: true and contextIsolation: false), enabling the XSS to escalate to full remote code execution on the host system.

Impact

The impact of this vulnerability is severe (CVSS score: 9.6). A successful exploit could allow a remote attacker to:

  • Execute arbitrary code on a victim’s computer with the privileges of the Notesnook application.
  • Install malware, steal sensitive data, or gain persistent access to the system.
  • Potentially move laterally within a network if the compromised system is part of one.

The attack vector is practical, as it only requires a user to clip a maliciously crafted webpage and later view the resulting note.

Remediation and Mitigation

The vendor has released patched versions that address this vulnerability. All users must update immediately.

Action Required:

  1. Update Notesnook: Upgrade to version 3.3.11 or later for Web/Desktop platforms, and version 3.3.17 or later for Android/iOS. Updates should be obtained through official channels (the Notesnook website, official app stores).
  2. Review Clipped Content: Exercise caution when using the Web Clipper feature on untrusted websites until the update is applied.
  3. General Security Hygiene: This incident underscores the importance of timely software updates. As seen in other high-profile cases, like the Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access, delaying patches can lead to significant compromise. Similarly, the risks of executing untrusted code highlight why platforms enforce security measures, such as Google’s 24-Hour Sideloading Wait to Combat Android Malware. For developers, this is a reminder to follow secure coding practices for web content isolation, a topic also relevant in the context of AI frameworks as discussed in LangChain, LangGraph Flaws Expose AI Systems - CISA Warns of Active Exploitation.

No viable workarounds exist besides applying the official patch. Users who cannot update immediately should consider disabling or avoiding the Web Clipper feature.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.