NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.39, the checkSQL() validation function that blocks dangerous SQL keywords (e.g., pg_read_file, LOAD_FILE, dblink) is applied on the collections:create and sqlCollection:execute endpoints but is entirely missing on the sqlCollection:update endpoint. An attacker with collection management permissions can create a SQL collection with benign SQL, then update it with arbitrary SQL that bypasses all validation, and query the collection to execute the injected SQL and exfiltrate data. This issue has been patched in version 2.0.39.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wrwh-c28m-9jjh | @nocobase/plugin-collection-sql: SQL Validation Bypass Through Missing `checkSQL` Call |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nocobase
Nocobase nocobase |
|
| Vendors & Products |
Nocobase
Nocobase nocobase |
Thu, 07 May 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.39, the checkSQL() validation function that blocks dangerous SQL keywords (e.g., pg_read_file, LOAD_FILE, dblink) is applied on the collections:create and sqlCollection:execute endpoints but is entirely missing on the sqlCollection:update endpoint. An attacker with collection management permissions can create a SQL collection with benign SQL, then update it with arbitrary SQL that bypasses all validation, and query the collection to execute the injected SQL and exfiltrate data. This issue has been patched in version 2.0.39. | |
| Title | NocoBase Vulnerable to SQL Validation Bypass via `sqlCollection:update` Missing `checkSQL` Call | |
| Weaknesses | CWE-284 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T04:13:33.609Z
Reserved: 2026-04-21T23:58:43.801Z
Link: CVE-2026-41641
No data.
Status : Received
Published: 2026-05-07T06:16:05.073
Modified: 2026-05-07T06:16:05.073
Link: CVE-2026-41641
No data.
OpenCVE Enrichment
Updated: 2026-05-07T06:30:06Z
Github GHSA