NocoBase RCE (CVE-2026-34156) [PoC]
CVE-2026-34156
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScr...
Overview
A critical sandbox escape vulnerability, tracked as CVE-2026-34156, affects the NocoBase no-code/low-code platform. The flaw resides in the platform’s Workflow Script Node, which is designed to execute user-supplied JavaScript in a sandboxed environment. This sandbox was insufficiently isolated, allowing authenticated users to break out and execute arbitrary commands on the underlying host server with root privileges.
Technical Details
NocoBase versions prior to 2.0.28 execute user JavaScript within a Node.js vm sandbox. While the system used an allowlist for required modules, the console object passed into the sandbox context contained a critical oversight. It exposed host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An attacker could leverage these exposed objects to traverse the prototype chain, bypass the sandbox restrictions, and gain direct access to the host Node.js environment. The attack complexity is low, requires no user interaction, and can be performed over the network by any authenticated user.
Impact
The impact of this vulnerability is severe. A successful exploitation results in full Remote Code Execution (RCE) on the server hosting the NocoBase application, with the attacker gaining root-level privileges. This allows complete compromise of the server, enabling data theft, deployment of ransomware, or use as a foothold for lateral movement within a corporate network. Given NocoBase’s use in building business applications, compromised instances could expose sensitive enterprise data and critical internal workflows. For context on the damage caused by server compromises, recent incidents are detailed in our breach reports.
Remediation and Mitigation
The primary and mandatory action is to immediately upgrade NocoBase to version 2.0.28 or later, which contains the patch. There is no effective workaround for this vulnerability. Organizations should:
- Patch Immediately: Upgrade all affected NocoBase instances to version 2.0.28+ without delay.
- Audit Access: Review logs for any unusual activity in workflow scripts prior to patching.
- Principle of Least Privilege: Ensure NocoBase application accounts and the underlying server OS accounts operate with minimal necessary permissions, even though the root-level exploit bypasses this at the OS layer post-compromise.
Stay informed on the latest vulnerability disclosures by following our security news.
Security Insight
This vulnerability highlights the persistent challenge of securely sandboxing user code, especially in low-code platforms that inherently grant users higher levels of system interaction. It echoes historical Node.js vm sandbox escapes, demonstrating that custom security wrappers often reintroduce risk if not meticulously audited. The flaw’s presence in a core feature like the Workflow Script Node suggests a need for more rigorous security review of the platform’s extensibility mechanisms.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-34156?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| franckboumendil/CVE-2026-34156 NocoBase Sandbox Escape to RCE via console._stdout Prototype Chain Traversal (CVE-2026-34156) | ★ 0 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti'...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...