Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

2 vulnerabilities found for plugin-workflow-javascript by nocobase

CVE-2026-6224 (GCVE-0-2026-6224)

Vulnerability from nvd – Published: 2026-04-13 21:15 – Updated: 2026-04-13 21:15
VLAI?
Title
nocobase plugin-workflow-javascript Vm.js createSafeConsole sandbox
Summary
A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2.0.23. This issue affects the function createSafeConsole of the file packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. Performing a manipulation results in sandbox issue. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE
Assigner
References
Impacted products
Vendor Product Version
nocobase plugin-workflow-javascript Affected: 2.0.0
Affected: 2.0.1
Affected: 2.0.2
Affected: 2.0.3
Affected: 2.0.4
Affected: 2.0.5
Affected: 2.0.6
Affected: 2.0.7
Affected: 2.0.8
Affected: 2.0.9
Affected: 2.0.10
Affected: 2.0.11
Affected: 2.0.12
Affected: 2.0.13
Affected: 2.0.14
Affected: 2.0.15
Affected: 2.0.16
Affected: 2.0.17
Affected: 2.0.18
Affected: 2.0.19
Affected: 2.0.20
Affected: 2.0.21
Affected: 2.0.22
Affected: 2.0.23
Create a notification for this product.
Credits
Paaai (VulDB User) VulDB CNA Team
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "plugin-workflow-javascript",
          "vendor": "nocobase",
          "versions": [
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "2.0.1"
            },
            {
              "status": "affected",
              "version": "2.0.2"
            },
            {
              "status": "affected",
              "version": "2.0.3"
            },
            {
              "status": "affected",
              "version": "2.0.4"
            },
            {
              "status": "affected",
              "version": "2.0.5"
            },
            {
              "status": "affected",
              "version": "2.0.6"
            },
            {
              "status": "affected",
              "version": "2.0.7"
            },
            {
              "status": "affected",
              "version": "2.0.8"
            },
            {
              "status": "affected",
              "version": "2.0.9"
            },
            {
              "status": "affected",
              "version": "2.0.10"
            },
            {
              "status": "affected",
              "version": "2.0.11"
            },
            {
              "status": "affected",
              "version": "2.0.12"
            },
            {
              "status": "affected",
              "version": "2.0.13"
            },
            {
              "status": "affected",
              "version": "2.0.14"
            },
            {
              "status": "affected",
              "version": "2.0.15"
            },
            {
              "status": "affected",
              "version": "2.0.16"
            },
            {
              "status": "affected",
              "version": "2.0.17"
            },
            {
              "status": "affected",
              "version": "2.0.18"
            },
            {
              "status": "affected",
              "version": "2.0.19"
            },
            {
              "status": "affected",
              "version": "2.0.20"
            },
            {
              "status": "affected",
              "version": "2.0.21"
            },
            {
              "status": "affected",
              "version": "2.0.22"
            },
            {
              "status": "affected",
              "version": "2.0.23"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Paaai (VulDB User)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "VulDB CNA Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2.0.23. This issue affects the function createSafeConsole of the file packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. Performing a manipulation results in sandbox issue. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-265",
              "description": "Sandbox Issue",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-264",
              "description": "Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-13T21:15:11.914Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-357142 | nocobase plugin-workflow-javascript Vm.js createSafeConsole sandbox",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/vuln/357142"
        },
        {
          "name": "VDB-357142 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/357142/cti"
        },
        {
          "name": "Submit #785881 | NocoBase 2.0.23 Sandbox Issue",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/785881"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/Pai-777/ai-cve/blob/main/docs/cve-drafts/nocobase-workflow-javascript-sandbox-escape.en.md"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-04-13T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-04-13T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-04-13T15:54:30.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "nocobase plugin-workflow-javascript Vm.js createSafeConsole sandbox"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-6224",
    "datePublished": "2026-04-13T21:15:11.914Z",
    "dateReserved": "2026-04-13T13:49:25.263Z",
    "dateUpdated": "2026-04-13T21:15:11.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6224 (GCVE-0-2026-6224)

Vulnerability from cvelistv5 – Published: 2026-04-13 21:15 – Updated: 2026-04-13 21:15
VLAI?
Title
nocobase plugin-workflow-javascript Vm.js createSafeConsole sandbox
Summary
A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2.0.23. This issue affects the function createSafeConsole of the file packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. Performing a manipulation results in sandbox issue. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE
Assigner
References
Impacted products
Vendor Product Version
nocobase plugin-workflow-javascript Affected: 2.0.0
Affected: 2.0.1
Affected: 2.0.2
Affected: 2.0.3
Affected: 2.0.4
Affected: 2.0.5
Affected: 2.0.6
Affected: 2.0.7
Affected: 2.0.8
Affected: 2.0.9
Affected: 2.0.10
Affected: 2.0.11
Affected: 2.0.12
Affected: 2.0.13
Affected: 2.0.14
Affected: 2.0.15
Affected: 2.0.16
Affected: 2.0.17
Affected: 2.0.18
Affected: 2.0.19
Affected: 2.0.20
Affected: 2.0.21
Affected: 2.0.22
Affected: 2.0.23
Create a notification for this product.
Credits
Paaai (VulDB User) VulDB CNA Team
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "plugin-workflow-javascript",
          "vendor": "nocobase",
          "versions": [
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "2.0.1"
            },
            {
              "status": "affected",
              "version": "2.0.2"
            },
            {
              "status": "affected",
              "version": "2.0.3"
            },
            {
              "status": "affected",
              "version": "2.0.4"
            },
            {
              "status": "affected",
              "version": "2.0.5"
            },
            {
              "status": "affected",
              "version": "2.0.6"
            },
            {
              "status": "affected",
              "version": "2.0.7"
            },
            {
              "status": "affected",
              "version": "2.0.8"
            },
            {
              "status": "affected",
              "version": "2.0.9"
            },
            {
              "status": "affected",
              "version": "2.0.10"
            },
            {
              "status": "affected",
              "version": "2.0.11"
            },
            {
              "status": "affected",
              "version": "2.0.12"
            },
            {
              "status": "affected",
              "version": "2.0.13"
            },
            {
              "status": "affected",
              "version": "2.0.14"
            },
            {
              "status": "affected",
              "version": "2.0.15"
            },
            {
              "status": "affected",
              "version": "2.0.16"
            },
            {
              "status": "affected",
              "version": "2.0.17"
            },
            {
              "status": "affected",
              "version": "2.0.18"
            },
            {
              "status": "affected",
              "version": "2.0.19"
            },
            {
              "status": "affected",
              "version": "2.0.20"
            },
            {
              "status": "affected",
              "version": "2.0.21"
            },
            {
              "status": "affected",
              "version": "2.0.22"
            },
            {
              "status": "affected",
              "version": "2.0.23"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Paaai (VulDB User)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "VulDB CNA Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2.0.23. This issue affects the function createSafeConsole of the file packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. Performing a manipulation results in sandbox issue. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-265",
              "description": "Sandbox Issue",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-264",
              "description": "Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-13T21:15:11.914Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-357142 | nocobase plugin-workflow-javascript Vm.js createSafeConsole sandbox",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/vuln/357142"
        },
        {
          "name": "VDB-357142 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/357142/cti"
        },
        {
          "name": "Submit #785881 | NocoBase 2.0.23 Sandbox Issue",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/785881"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/Pai-777/ai-cve/blob/main/docs/cve-drafts/nocobase-workflow-javascript-sandbox-escape.en.md"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-04-13T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-04-13T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-04-13T15:54:30.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "nocobase plugin-workflow-javascript Vm.js createSafeConsole sandbox"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-6224",
    "datePublished": "2026-04-13T21:15:11.914Z",
    "dateReserved": "2026-04-13T13:49:25.263Z",
    "dateUpdated": "2026-04-13T21:15:11.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}