NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an authenticated user with org-level-creator permissions can exploit prototype pollution in the `/api/v2/meta/connection/test` endpoint, causing all database write operations to fail application-wide until server restart. While the pollution technically bypasses SUPER_ADMIN authorization checks, no practical privileged actions can be performed because database operations fail immediately after pollution. Version 0.301.0 patches the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-95ff-46g6-6gw9 NocoDB has Prototype Pollution in Connection Test Endpoint, Leading to DoS
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 30 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Nocodb
Nocodb nocodb
Vendors & Products Nocodb
Nocodb nocodb

Wed, 28 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
Description NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an authenticated user with org-level-creator permissions can exploit prototype pollution in the `/api/v2/meta/connection/test` endpoint, causing all database write operations to fail application-wide until server restart. While the pollution technically bypasses SUPER_ADMIN authorization checks, no practical privileged actions can be performed because database operations fail immediately after pollution. Version 0.301.0 patches the issue.
Title NocoDB Vulnerable to Prototype Pollution in Connection Test Endpoint, Leading to DoS
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T18:01:30.160Z

Reserved: 2026-01-26T21:06:47.868Z

Link: CVE-2026-24766

cve-icon Vulnrichment

Updated: 2026-01-29T16:03:36.099Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-01-28T21:16:12.103

Modified: 2026-01-29T16:31:00.867

Link: CVE-2026-24766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-29T09:08:51Z

Weaknesses