CVE-2026-28398
Received Received - Intake
Stored XSS in NocoDB Comments and Rich Text Cells

Publication date: 2026-03-02

Last updated on: 2026-03-03

Assigner: GitHub, Inc.

Description
NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, user-controlled content in comments and rich text cells was rendered via v-html without sanitization, enabling stored XSS. This issue has been patched in version 0.301.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-02
Last Modified
2026-03-03
Generated
2026-05-07
AI Q&A
2026-03-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nocodb nocodb to 0.301.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-28398 is a stored Cross-Site Scripting (XSS) vulnerability in the npm package nocodb, affecting versions up to 0.301.2 and fixed in version 0.301.3.'}, {'type': 'paragraph', 'content': "The vulnerability occurs because user-controlled content in comments and rich text cells is rendered using Vue's v-html directive without proper sanitization. Specifically, comments and rich text are parsed with markdown-it allowing raw HTML injection and then directly injected via v-html, bypassing the sanitization library vue-dompurify-html."}, {'type': 'paragraph', 'content': 'On the server side, input is not sanitized before storage due to the use of extractProps() instead of the safer extractPropsAndSanitize() method.'}, {'type': 'paragraph', 'content': 'This allows attackers with Commenter or Editor roles to inject malicious scripts that execute in the browsers of users viewing the affected content.'}] [1]


How can this vulnerability impact me? :

This stored XSS vulnerability can allow attackers to execute malicious scripts in the browsers of users who view the affected comments or rich text cells.

Such script execution can lead to theft of user credentials, session hijacking, defacement, or other malicious actions performed on behalf of the victim.

Because the vulnerability is stored, the malicious payload persists and affects all users who access the compromised content.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves stored Cross-Site Scripting (XSS) in user-controlled content within comments and rich text cells rendered via v-html without sanitization. Detection involves identifying if your NocoDB instance is running a vulnerable version (up to 0.301.2) and checking for malicious scripts in comments or rich text cells.'}, {'type': 'paragraph', 'content': 'You can detect the vulnerability by verifying the NocoDB version with a command such as:'}, {'type': 'list_item', 'content': 'npm list nocodb'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts, you can monitor HTTP requests or database entries for suspicious HTML or script tags in comments or rich text fields. For example, searching the database for script tags in comments or rich text cells could be done with a query like:'}, {'type': 'list_item', 'content': "SELECT * FROM comments WHERE content LIKE '%<script>%';"}, {'type': 'list_item', 'content': "SELECT * FROM rich_text_cells WHERE content LIKE '%<script>%';"}, {'type': 'paragraph', 'content': 'Additionally, monitoring web traffic for unusual payloads or using web application scanners that detect stored XSS vulnerabilities can help identify exploitation.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade NocoDB to version 0.301.3 or later, where the vulnerability has been patched.

Until the upgrade can be applied, consider restricting user roles that can add comments or edit rich text cells, as the vulnerability can be exploited by users with Commenter and Editor roles.

Additionally, review and sanitize existing comments and rich text cells to remove any malicious scripts.

Implement web application firewall (WAF) rules to detect and block common XSS payloads targeting your NocoDB instance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart