GHSA-8vm4-g489-v3w7

Suggest an improvement
Source
https://github.com/advisories/GHSA-8vm4-g489-v3w7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-8vm4-g489-v3w7/GHSA-8vm4-g489-v3w7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8vm4-g489-v3w7
Aliases
Published
2026-03-03T20:58:44Z
Modified
2026-03-04T15:12:47.606592Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVSS Calculator
Summary
NocoDB Vulnerable to Stored Cross-Site Scripting via Comments and Rich Text Cells
Details

Summary

User-controlled content in comments and rich text cells was rendered via v-html without sanitization, enabling stored XSS.

Details

Comments in Comments.vue and rich text in TextArea.vue were parsed by markdown-it with html: true and injected via v-html. The codebase had vue-dompurify-html available but these paths used raw v-html. Server-side, Comment.insert() used extractProps() instead of extractPropsAndSanitize().

Commenter role is sufficient for the comments vector; Editor role for rich text.

This issue was independently reported; see also GHSA-rcph-x7mj-54mm and GHSA-wwp2-x4rj-j8rm for the same root cause found by GitHub Security Lab.

Impact

Stored XSS — malicious scripts execute for any user viewing the comment or cell.

Credit

This issue was reported by @bugbunny-research (bugbunny.ai).

Database specific
{
    "github_reviewed_at": "2026-03-03T20:58:44Z",
    "nvd_published_at": "2026-03-02T17:16:34Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed": true
}
References

Affected packages

npm / nocodb

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.301.3

Database specific

last_known_affected_version_range
"<= 0.301.2"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-8vm4-g489-v3w7/GHSA-8vm4-g489-v3w7.json"