Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper input validation, together with an overly permissive default CORS configuration in Open Notebook v1.8.1 allows remote attacker to trick a legitimate user to alter or delete arbitrary database entries via specially crafted malicious URL. Depending on the deployment, data exfiltration is also possible. | |
| Title | SurrealDB Injection on Open Notebook | |
| Weaknesses | CWE-20 CWE-352 CWE-917 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ENISA
Published:
Updated: 2026-05-07T11:37:04.993Z
Reserved: 2026-02-25T14:02:29.493Z
Link: CVE-2026-28201
Updated: 2026-05-07T11:37:01.092Z
Status : Received
Published: 2026-05-07T11:16:00.747
Modified: 2026-05-07T11:16:00.747
Link: CVE-2026-28201
No data.
OpenCVE Enrichment
Updated: 2026-05-07T12:30:29Z