Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @nocobase/plugin-collection-sql
  4. ›
  5. CVE-2026-41641

CVE-2026-41641: @nocobase/plugin-collection-sql: SQL Validation Bypass Through Missing `checkSQL` Call

April 22, 2026

The checkSQL() validation function that blocks dangerous SQL keywords (e.g., pg_read_file, LOAD_FILE, dblink) is applied on the collections:create and sqlCollection:execute endpoints but is entirely missing on the sqlCollection:update endpoint. An attacker with collection management permissions can create a SQL collection with benign SQL, then update it with arbitrary SQL that bypasses all validation, and query the collection to execute the injected SQL and exfiltrate data.

Affected component: @nocobase/plugin-collection-sql Affected versions: <= 2.0.32 (confirmed) Minimum privilege: Collection management permissions (pm.data-source-manager.collection-sql snippet)

References

  • github.com/advisories/GHSA-wrwh-c28m-9jjh
  • github.com/nocobase/nocobase
  • github.com/nocobase/nocobase/commit/851aee543efa894142e0f7be03eb55d9cec06a91
  • github.com/nocobase/nocobase/pull/9134
  • github.com/nocobase/nocobase/security/advisories/GHSA-wrwh-c28m-9jjh
  • nvd.nist.gov/vuln/detail/CVE-2026-41641

Code Behaviors & Features

Detect and mitigate CVE-2026-41641 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.0.39

Fixed versions

  • 2.0.39

Solution

Upgrade to version 2.0.39 or above.

Impact 7.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

npm/@nocobase/plugin-collection-sql/CVE-2026-41641.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 25 Apr 2026 12:17:50 +0000.