Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-34156 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: NocoBase Workflow Script Node allows **Remote Code Execution (RCE)**. πŸ“‰ **Consequences**: Attackers escape the `vm` sandbox via prototype pollution, gaining full control over the host system.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-913** (Improper Control of Dynamically-Managed Code Resources). The `console` object in the Node.js `vm` sandbox leaks `WritableWorkerStdio` streams, enabling prototype chain traversal. 🧬

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **NocoBase** (Low-code platform). πŸ“… **Versions**: All versions **before 2.0.28**. βœ… **Fixed**: Version 2.0.28+.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Achieves **RCE as root**. 🌐 Can execute arbitrary commands, access sensitive data, and pivot to other internal systems. Full system compromise.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. ⚠️ Requires **Authenticated** access. 🚫 No UI interaction needed (UI:N). Low complexity (AC:L). Network accessible (AV:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit Status**: **Yes**. Public PoC exists via Nuclei templates. πŸ“‚ GitHub Advisory (GHSA-px3p-vgh9-m57c) details the `console._stdout.constructor` exploitation path.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check NocoBase version (< 2.0.28). 2. Scan for Workflow Script Nodes. 3. Use Nuclei template `CVE-2026-34156.yaml` for automated detection. πŸ› οΈ

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **Yes**. Upgrade to **NocoBase v2.0.28** or later. πŸ“₯ Pull Request #8967 addresses the sandbox leakage issue.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. Restrict access to Workflow Script Nodes. 2. Disable unnecessary workflow scripts. 3. Isolate the NocoBase instance from critical networks. πŸ›‘

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 CVSS Score: **9.8** (High). Immediate patching required due to RCE potential and low exploitation barrier for authenticated users.