Nocobase Plugin Sandbox Bypass: Remote Exploit Publicly Available

Nocobase Plugin Sandbox Bypass: Remote Exploit Publicly Available

A critical security flaw, identified as CVE-2026-6224, has been uncovered in the nocobase plugin-workflow-javascript up to version 2.0.23. According to the National Vulnerability Database, this vulnerability stems from the createSafeConsole function within the Vm.js file, allowing for a sandbox escape. This isn’t just a theoretical bug; the National Vulnerability Database reports that a remote exploit is already in the wild, meaning attackers can weaponize this without needing physical access or extensive user interaction.

The implications of a sandbox escape are significant. It essentially means an attacker can break out of the intended secure environment and potentially execute arbitrary code on the underlying system. The National Vulnerability Database has assigned this a CVSS score of 7.3 (HIGH), underscoring the severity. The unfortunate kicker here is the vendor’s silence — the National Vulnerability Database noted that initial disclosure attempts went unanswered, leaving users exposed with no official patch in sight.

This is a classic case where a seemingly innocuous plugin can open up a world of pain. The National Vulnerability Database highlighted CWE-264 and CWE-265, both related to permissions, privileges, and access controls. When a vendor goes dark on a critical vulnerability, it puts the onus squarely on the users to be hyper-vigilant and consider mitigation strategies or, frankly, ditch the component until a fix is available.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 5 SIEM formats

5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-6224

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6224 Sandbox Escape nocobase plugin-workflow-javascript up to version 2.0.23
CVE-2026-6224 Sandbox Escape Vulnerable function: createSafeConsole in packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs