CVE-2026-24768 Overview
CVE-2026-24768 is an unvalidated redirect (open redirect) vulnerability in NocoDB, an open-source platform for building databases as spreadsheets. The flaw exists in NocoDB's login flow due to missing validation of the continueAfterSignIn parameter. During authentication, NocoDB processes a user-controlled redirect value and conditionally performs client-side navigation without enforcing any restrictions on the destination's origin, domain, or protocol. This allows attackers to redirect authenticated users to arbitrary external websites after login.
Critical Impact
This vulnerability enables sophisticated phishing attacks by exploiting user trust in the legitimate NocoDB login flow, potentially leading to credential theft through social engineering.
Affected Products
- NocoDB versions prior to 0.301.0
Discovery Timeline
- 2026-01-28 - CVE CVE-2026-24768 published to NVD
- 2026-01-29 - Last updated in NVD database
Technical Details for CVE-2026-24768
Vulnerability Analysis
This vulnerability is classified as CWE-601 (URL Redirection to Untrusted Site), commonly known as an open redirect vulnerability. The flaw resides in NocoDB's authentication mechanism where the continueAfterSignIn parameter is processed without proper validation. When a user authenticates through the login page, NocoDB accepts a redirect URL from user input and performs client-side navigation to that destination after successful authentication.
The lack of origin, domain, and protocol validation means an attacker can craft a malicious login URL containing an external destination. When an unsuspecting user clicks this link and authenticates normally, they are seamlessly redirected to an attacker-controlled website. This technique is particularly effective for phishing because the user believes they are interacting with a legitimate NocoDB instance throughout the authentication process.
Root Cause
The root cause of this vulnerability is the absence of input validation on the continueAfterSignIn parameter within NocoDB's authentication flow. The application fails to implement allowlist-based validation or same-origin checks before performing the redirect operation. This design oversight allows arbitrary URLs to be specified as redirect targets, including external domains and different protocols.
Attack Vector
The attack vector for CVE-2026-24768 is network-based and requires the attacker to craft a malicious URL that includes the continueAfterSignIn parameter pointing to an attacker-controlled domain. The attacker then distributes this URL through phishing emails, social media, or other means. When a victim clicks the link, they see the legitimate NocoDB login page. After entering valid credentials and authenticating, the user is redirected to the malicious site instead of the expected NocoDB dashboard.
At the malicious destination, the attacker can present a fake session timeout page or duplicate login form to harvest credentials, or serve malware. The effectiveness of this attack relies on the victim's trust in the legitimate authentication flow they just completed.
Detection Methods for CVE-2026-24768
Indicators of Compromise
- Login URLs containing continueAfterSignIn parameters pointing to external domains
- User reports of unexpected redirects after NocoDB authentication
- Web server logs showing login requests with suspicious redirect parameters containing external URLs
- Phishing campaigns targeting your organization that reference NocoDB login pages
Detection Strategies
- Implement web application firewall (WAF) rules to detect and block requests with continueAfterSignIn parameters containing external domains
- Monitor authentication logs for login attempts followed by redirects to non-whitelisted domains
- Deploy URL filtering to identify and alert on NocoDB login URLs with suspicious redirect parameters
- Configure browser security policies to warn users when being redirected to external domains after authentication
Monitoring Recommendations
- Enable detailed logging for NocoDB authentication events including full URL parameters
- Set up alerts for authentication flows that include redirect parameters pointing outside your organization's domain
- Monitor for unusual patterns of login activity followed by immediate session termination, which may indicate successful redirect attacks
- Review referrer headers in downstream systems that may receive traffic from open redirect exploitation
How to Mitigate CVE-2026-24768
Immediate Actions Required
- Upgrade NocoDB to version 0.301.0 or later immediately
- Review authentication logs for any suspicious redirect activity that may indicate prior exploitation
- Educate users about phishing risks and the importance of verifying URLs after authentication
- Consider implementing additional security controls such as a reverse proxy with URL validation
Patch Information
NocoDB has addressed this vulnerability in version 0.301.0. The fix implements proper validation of the continueAfterSignIn parameter to restrict redirects to trusted destinations only. Organizations should upgrade to this version or later to remediate the vulnerability. For detailed information about the fix, refer to the GitHub Security Advisory.
Workarounds
- Deploy a reverse proxy or web application firewall to intercept and validate redirect parameters before they reach the NocoDB instance
- Restrict access to NocoDB login pages to trusted networks or VPN connections to limit the attack surface
- Implement Content Security Policy (CSP) headers to restrict navigation to approved domains
- Configure network monitoring to alert on redirects from NocoDB to external domains
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


