CVE-2026-34825 in NocoBase Plugin
Сводка (Английский)
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.30, NocoBase plugin-workflow-sql substitutes template variables directly into raw SQL strings via getParsedValue() without parameterization or escaping. Any user who triggers a workflow containing a SQL node with template variables from user-controlled data can inject arbitrary SQL. This issue has been patched in version 2.0.30.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Ответственный
GitHub_M
Резервировать
30.03.2026
Раскрытие
02.04.2026
Статус
Подтверждённый
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 355029 | nocobase NocoBase Plugin Parameter getParsedValue SQL-инъекция | 89 | Не определено | Официальное исправление | CVE-2026-34825 |