CVE-2026-33976
Description
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using contentDocument.write(...). Event-handler attributes such as onload, onclick, or onmouseover execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with nodeIntegration: true and contextIsolation: false. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.
Affected products
3- cpe:2.3:a:streetwriters:notesnook_desktop:*:*:*:*:*:*:*:*Range: <3.3.11
cpe:2.3:a:streetwriters:notesnook_mobile:*:*:*:*:*:android:*:*+ 1 more
- cpe:2.3:a:streetwriters:notesnook_mobile:*:*:*:*:*:android:*:*range: <3.3.17
- cpe:2.3:a:streetwriters:notesnook_mobile:*:*:*:*:*:iphone_os:*:*range: <3.3.17
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/streetwriters/notesnook/security/advisories/GHSA-f42f-phvp-43x5nvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.