An improper input validation, together with an overly permissive default CORS configuration in Open Notebook v1.8.1 allows remote attacker to trick a legitimate user to alter or delete arbitrary database entries via specially crafted malicious URL. Depending on the deployment, data exfiltration is also possible.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper input validation, together with an overly permissive default CORS configuration in Open Notebook v1.8.1 allows remote attacker to trick a legitimate user to alter or delete arbitrary database entries via specially crafted malicious URL. Depending on the deployment, data exfiltration is also possible. | |
| Title | SurrealDB Injection on Open Notebook | |
| Weaknesses | CWE-20 CWE-352 CWE-917 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ENISA
Published:
Updated: 2026-05-07T11:37:04.993Z
Reserved: 2026-02-25T14:02:29.493Z
Link: CVE-2026-28201
No data.
Status : Received
Published: 2026-05-07T11:16:00.747
Modified: 2026-05-07T11:16:00.747
Link: CVE-2026-28201
No data.
OpenCVE Enrichment
Updated: 2026-05-07T12:30:29Z