NocoBase SQL Injection Bypass (CVE-2026-41641) Exposes Data
The National Vulnerability Database has disclosed CVE-2026-41641, a high-severity SQL injection bypass affecting NocoBase, an AI-powered no-code/low-code platform. Prior to version 2.0.39, NocoBase’s checkSQL() validation function, designed to block dangerous SQL keywords like pg_read_file or LOAD_FILE, was critically missing from the sqlCollection:update endpoint.
This oversight allows an attacker with existing collection management permissions to initially create a SQL collection using benign SQL. They can then update this collection with arbitrary, malicious SQL that completely bypasses the intended validation. Subsequently, querying the updated collection executes the injected SQL, leading to potential data exfiltration, unauthorized data modification, or even full system compromise, as indicated by the CVSS score of 7.2.
This vulnerability highlights a critical flaw in input validation logic, specifically where different API endpoints handling the same data type (SQL collections) have inconsistent security controls. Defenders must recognize that partial validation is no validation at all when an attacker can leverage a less-protected path. The issue is patched in NocoBase version 2.0.39, making immediate upgrades imperative.
What This Means For You
- If your organization utilizes NocoBase, you must immediately verify that all instances are updated to version 2.0.39 or later to mitigate CVE-2026-41641. An attacker with collection management permissions can exploit this to exfiltrate sensitive data or compromise your NocoBase environment. Audit your NocoBase logs for any suspicious SQL collection updates or queries from privileged accounts.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41641 - NocoBase SQL Injection via sqlCollection:update
title: CVE-2026-41641 - NocoBase SQL Injection via sqlCollection:update
id: scw-2026-05-07-ai-1
status: experimental
level: critical
description: |
This rule detects the specific API endpoint and method used in the NocoBase SQL injection vulnerability (CVE-2026-41641). Attackers with collection management permissions can exploit the missing validation on the sqlCollection:update endpoint to inject arbitrary SQL, bypassing security checks and exfiltrating data. This detection focuses on the direct exploitation attempt targeting the vulnerable endpoint.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41641/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
uri|contains:
- '/api/sqlCollections/update'
cs-method|exact: "POST"
cs-uri-query|contains:
- 'id='
- 'data='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41641 | SQLi | NocoBase < 2.0.39 |
| CVE-2026-41641 | SQLi | Vulnerable function: checkSQL() |
| CVE-2026-41641 | SQLi | Vulnerable endpoint: sqlCollection:update |
| CVE-2026-41641 | Information Disclosure | Data exfiltration via SQL injection |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 09:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.