Stored Cross-Site Scripting via Comments · Advisory · nocodb/nocodb · GitHub
Skip to content

Stored Cross-Site Scripting via Comments

High
mertmit published GHSA-rcph-x7mj-54mm Mar 2, 2026

Package

npm nocodb (npm)

Affected versions

<= 0.301.2

Patched versions

0.301.3

Description

Summary

Comments rendered via v-html without sanitization, enabling stored XSS.

Details

Comments in Comments.vue were parsed by markdown-it with html: true and injected via v-html without DOMPurify. A user with Commenter role can inject arbitrary HTML that executes for all viewers.

Impact

Stored XSS — malicious scripts execute for any user viewing the comment.

Credit

This issue was discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members @p- (Peter Stockli) and @m-y-mo (Man Yue Mo).

Severity

High

CVE ID

CVE-2026-28397

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Credits