<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6224 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6224/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6224/feed.xml" rel="self" type="application/rss+xml"/><item><title>NocoBase plugin-workflow-javascript Sandbox Escape Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nocobase-rce/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nocobase-rce/</guid><description>A remote code execution vulnerability exists in NocoBase plugin-workflow-javascript versions up to 2.0.23 due to a sandbox escape in the createSafeConsole function, allowing unauthenticated attackers to potentially execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>A critical security flaw, identified as CVE-2026-6224, affects NocoBase plugin-workflow-javascript versions up to 2.0.23. This vulnerability resides in the <code>createSafeConsole</code> function within the <code>packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js</code> file. By manipulating this function, an attacker can escape the intended sandbox environment. Publicly available exploits exist, increasing the risk of active exploitation. This vulnerability allows for remote, unauthenticated exploitation, making it a significant threat to systems running the affected NocoBase plugin. The vendor has not responded to vulnerability disclosure attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious request to the NocoBase server targeting the <code>plugin-workflow-javascript</code> component.</li>
<li>The request is processed by the vulnerable <code>createSafeConsole</code> function within <code>Vm.js</code>.</li>
<li>The attacker leverages the identified manipulation technique to bypass the intended sandbox restrictions.</li>
<li>The attacker gains unauthorized access to the underlying server environment.</li>
<li>The attacker injects and executes arbitrary JavaScript code within the server context.</li>
<li>The attacker escalates privileges to gain further control of the system.</li>
<li>The attacker establishes persistence through creating new user accounts or modifying system configurations.</li>
<li>The attacker achieves arbitrary code execution on the server, leading to potential data theft, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6224 can lead to complete compromise of the NocoBase server. An attacker can gain unauthorized access to sensitive data, modify system configurations, install malware, or disrupt normal operations. Given the nature of NocoBase as a data management platform, the impact could include widespread data breaches and significant reputational damage. Because exploits are publicly available, organizations using vulnerable versions of the plugin are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NocoBase plugin-workflow-javascript to a patched version beyond 2.0.23 to remediate CVE-2026-6224.</li>
<li>Deploy the provided Sigma rule <code>Detect Suspicious NocoBase Workflow JavaScript Activity</code> to identify potential exploitation attempts targeting the <code>createSafeConsole</code> function.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js</code> path.</li>
<li>Implement strict input validation and sanitization measures to prevent malicious code injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>nocobase</category><category>rce</category><category>sandbox-escape</category><category>cve-2026-6224</category></item></channel></rss>