CVE-2026-24768
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-28

Last updated on: 2026-02-04

Assigner: GitHub, Inc.

Description
NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an unvalidated redirect (open redirect) vulnerability exists in NocoDB’s login flow due to missing validation of the `continueAfterSignIn` parameter. During authentication, NocoDB processes a user-controlled redirect value and conditionally performs client-side navigation without enforcing any restrictions on the destination’s origin, domain or protocol. This allows attackers to redirect authenticated users to arbitrary external websites after login. This vulnerability enables phishing attacks by leveraging user trust in the legitimate NocoDB login flow. While it does not directly expose credentials or bypass authentication, it increases the likelihood of credential theft through social engineering. The issue does not allow arbitrary code execution or privilege escalation, but it undermines authentication integrity. Version 0.301.0 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-04
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nocodb nocodb to 0.301.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an unvalidated redirect (open redirect) in NocoDB's login flow prior to version 0.301.0. It occurs because the `continueAfterSignIn` parameter is not validated, allowing attackers to redirect authenticated users to arbitrary external websites after login. This can be exploited to conduct phishing attacks by leveraging user trust in the legitimate login process. The vulnerability does not expose credentials directly or bypass authentication but increases the risk of credential theft through social engineering.


How can this vulnerability impact me? :

The vulnerability can impact you by enabling attackers to redirect authenticated users to malicious external sites after login, facilitating phishing attacks. This undermines the integrity of the authentication process and increases the likelihood of credential theft through social engineering. However, it does not allow attackers to execute arbitrary code or escalate privileges.


What immediate steps should I take to mitigate this vulnerability?

Upgrade NocoDB to version 0.301.0 or later, as this version fixes the unvalidated redirect vulnerability in the login flow by properly validating the `continueAfterSignIn` parameter.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart