CVE-2026-24769

CRITICAL
9.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Feb 04, 2026 - 20:01 vuln.today
Public exploit code
CVE Published
Jan 28, 2026 - 21:16 nvd
CRITICAL 9.0

Description

NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, a stored cross-site scripting (XSS) vulnerability exists in NocoDB’s attachment handling mechanism. Authenticated users can upload malicious SVG files containing embedded JavaScript, which are later rendered inline and executed in the browsers of other users who view the attachment. Because the malicious payload is stored server-side and executed under the application’s origin, successful exploitation can lead to account compromise, data exfiltration and unauthorized actions performed on behalf of affected users. Version 0.301.0 patches the issue.

Analysis

NocoDB spreadsheet platform prior to 0.301.0 has a stored XSS vulnerability (CVSS 9.0) that enables code execution through malicious cell content in shared views.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all NocoDB deployments and document current versions; restrict attachment upload functionality if operationally feasible; notify all NocoDB users of the vulnerability. Within 7 days: Implement WAF rules to sanitize attachment uploads and block suspicious XSS payloads; segment NocoDB instances from critical systems and sensitive data repositories; monitor access logs for exploitation attempts. …

Sign in for detailed remediation steps.

Priority Score

65
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +45
POC: +20

Share

CVE-2026-24769 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy