CVE-2026-6224
Description
A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2.0.23. This issue affects the function createSafeConsole of the file packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. Performing a manipulation results in sandbox issue. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A sandbox escape in nocobase plugin-workflow-javascript up to 2.0.23 allows remote attackers to break out of the VM isolation and access the host process via the console prototype chain.
Vulnerability
The plugin-workflow-javascript package in nocobase up to version 2.0.23 contains a sandbox escape vulnerability in the createSafeConsole function within Vm.js. The implementation attempts to block access to the host Function constructor by setting constructor to null on bound console methods (e.g., console.log). However, this only removes the property from the bound function object itself, not from its prototype chain. An attacker can still recover the host Function via Object.getPrototypeOf(console.log).constructor and then execute arbitrary code in the host context [1].
Exploitation
The attack can be initiated remotely without authentication, as the workflow JavaScript execution environment is accessible through the NocoBase UI. By crafting a malicious workflow script that uses the prototype chain to access Object.getPrototypeOf(console.log).constructor('return process')(), an attacker can escape the sandbox and gain access to the host process object. The exploit has been publicly released and is reproducible on the official nocobase/nocobase:2.0.23-full Docker image [1].
Impact
Successful exploitation allows an attacker to execute arbitrary code in the host Node.js process, bypassing the intended VM isolation. This can lead to full compromise of the server, including data exfiltration, lateral movement, and further attacks on the underlying infrastructure. The vulnerability is rated High with a CVSS v3 score of 7.3.
Mitigation
The vendor was contacted but did not respond. As of the publication date, no patch is available. Users should consider disabling the workflow-javascript plugin or restricting access to the NocoBase instance until a fix is released. The vulnerability is not yet listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.