GHSA-rcph-x7mj-54mm

Suggest an improvement
Source
https://github.com/advisories/GHSA-rcph-x7mj-54mm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-rcph-x7mj-54mm/GHSA-rcph-x7mj-54mm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rcph-x7mj-54mm
Aliases
Published
2026-03-03T20:59:38Z
Modified
2026-03-04T15:16:25.243721Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVSS Calculator
Summary
NocoDB Vulnerable to Stored Cross-site Scripting via Comments
Details

Summary

Comments rendered via v-html without sanitization, enabling stored XSS.

Details

Comments in Comments.vue were parsed by markdown-it with html: true and injected via v-html without DOMPurify. A user with Commenter role can inject arbitrary HTML that executes for all viewers.

Impact

Stored XSS — malicious scripts execute for any user viewing the comment.

Credit

This issue was discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members @p- (Peter Stockli) and @m-y-mo (Man Yue Mo).

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed_at": "2026-03-03T20:59:38Z",
    "nvd_published_at": "2026-03-02T17:16:34Z",
    "severity": "MODERATE"
}
References

Affected packages

npm / nocodb

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.301.3

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-rcph-x7mj-54mm/GHSA-rcph-x7mj-54mm.json"
last_known_affected_version_range
"<= 0.301.2"