UNKNOWNCVE-2026-33976

Notesnook vulnerable to RCE via stored XSS in Web Clipper rendering

Platform

other

Component

notesnook

Fixed in

3.3.11

Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.

How to fix

Actualice Notesnook Web/Desktop a la versión 3.3.11 o superior, y Notesnook Android/iOS a la versión 3.3.17 o superior. Esto corrige la vulnerabilidad XSS almacenada en el renderizado de Web Clipper que podría permitir la ejecución remota de código.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free
CVE-2026-33976 — Vulnerability Details | NextGuard | NextGuard