CVE-2022-3423: NocoDB vulnerable to Denial of Service
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.78877%
CWE
Published
10/7/2022
Updated
7/21/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| nocodb | npm | < 0.92.0 | 0.92.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing input validation on the 'New Project' field. The patch adds length validation (max 50 chars) to these form handling components. The files shown in the diff (CreateOrEditProject.vue, id.vue, xcdb.vue) all modified their validation rules from simple presence checks to include length restrictions, indicating these were the vulnerable points where unbounded input could be submitted. The CWE mapping to 'Uncontrolled Resource Consumption' (CWE-400) and 'Allocation of Resources Without Limits' (CWE-770) directly correlates with missing input size validation in project creation workflows.