๐Ÿ” CVE Alert

CVE-2026-41641

HIGH 7.2

NocoBase Vulnerable to SQL Validation Bypass via `sqlCollection:update` Missing `checkSQL` Call

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.39, the checkSQL() validation function that blocks dangerous SQL keywords (e.g., pg_read_file, LOAD_FILE, dblink) is applied on the collections:create and sqlCollection:execute endpoints but is entirely missing on the sqlCollection:update endpoint. An attacker with collection management permissions can create a SQL collection with benign SQL, then update it with arbitrary SQL that bypasses all validation, and query the collection to execute the injected SQL and exfiltrate data. This issue has been patched in version 2.0.39.

CWE CWE-89 CWE-284
Vendor nocobase
Product nocobase
Published May 7, 2026
Stay Ahead of the Next One

Get instant alerts for nocobase nocobase

Be the first to know when new high vulnerabilities affecting nocobase nocobase are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

nocobase / nocobase
< 2.0.39

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nocobase/nocobase/security/advisories/GHSA-wrwh-c28m-9jjh github.com: https://github.com/nocobase/nocobase/pull/9134 github.com: https://github.com/nocobase/nocobase/commit/851aee543efa894142e0f7be03eb55d9cec06a91 github.com: https://github.com/nocobase/nocobase/releases/tag/v2.0.39