The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-33955

CVE-2026-33955: Notesnook Desktop RCE Vulnerability

CVE-2026-33955 is a remote code execution flaw in Streetwriters Notesnook Desktop that escalates from XSS in the note history viewer. This article covers the technical details, affected versions, impact, and mitigation.

Published: April 2, 2026

CVE-2026-33955 Overview

CVE-2026-33955 is a stored Cross-Site Scripting (XSS) vulnerability in Notesnook, a popular note-taking application, that can escalate to Remote Code Execution (RCE) on desktop installations. The vulnerability exists in the note history comparison viewer, where attacker-controlled note headers are rendered using React's dangerouslySetInnerHTML without proper sanitization. When exploited on the Electron-based desktop application, the XSS payload gains full system access due to insecure Electron configuration settings.

Critical Impact

This vulnerability allows attackers to achieve remote code execution through a stored XSS attack vector, potentially compromising user systems when malicious notes are restored from backups.

Affected Products

  • Streetwriters Notesnook Desktop versions prior to 3.3.11
  • Streetwriters Notesnook Web versions prior to 3.3.11

Discovery Timeline

  • 2026-03-27 - CVE-2026-33955 published to NVD
  • 2026-04-02 - Last updated in NVD database

Technical Details for CVE-2026-33955

Vulnerability Analysis

The vulnerability stems from unsafe handling of user-controlled content within Notesnook's note history comparison feature. When a user views the history or diff of a note, the application renders note headers using React's dangerouslySetInnerHTML property. This method bypasses React's built-in XSS protections by directly inserting raw HTML into the DOM without sanitization.

Under normal circumstances, a stored XSS vulnerability would be limited to the browser context. However, Notesnook's Electron desktop application is configured with nodeIntegration: true and contextIsolation: false. These insecure settings allow JavaScript running in the renderer process to directly access Node.js APIs, effectively bridging web-based XSS to full operating system command execution.

The attack becomes particularly dangerous when combined with Notesnook's full backup and restore functionality. An attacker can craft a malicious backup file containing notes with XSS payloads embedded in their headers. When a victim imports and views this backup, the payload executes with full Node.js privileges.

Root Cause

The root cause is twofold: First, the application uses dangerouslySetInnerHTML to render user-controlled note header content without implementing proper HTML sanitization or encoding. Second, the Electron application's main process is configured with overly permissive security settings (nodeIntegration: true and contextIsolation: false), which removes the security boundary between the web content and the underlying Node.js runtime environment.

Attack Vector

The attack requires local interaction where a user must open a malicious note or restore a compromised backup. An attacker would craft a note with a malicious script payload embedded in the note header field. When the victim views the note history or comparison view, the unsanitized HTML is rendered, executing the attacker's JavaScript. In the desktop application context, this script can leverage Node.js APIs to execute arbitrary system commands, read/write files, or establish persistence.

The vulnerability mechanism involves injecting malicious HTML/JavaScript into note header fields, which are then rendered without sanitization in the history comparison viewer. When the dangerouslySetInnerHTML directive processes this content, the embedded script executes within the Electron renderer context. Due to the insecure Electron configuration, this script gains access to the full Node.js environment, enabling actions such as spawning child processes or accessing the file system. For detailed technical information, see the GitHub Security Advisory.

Detection Methods for CVE-2026-33955

Indicators of Compromise

  • Presence of unexpected JavaScript or HTML tags within note content, particularly in header fields
  • Unusual child processes spawned from the Notesnook desktop application
  • Suspicious network connections originating from the Notesnook process
  • Modified or newly created files in system directories by the Notesnook application

Detection Strategies

  • Monitor for suspicious script execution patterns within Electron-based applications
  • Implement endpoint detection rules for unexpected Node.js API calls from Notesnook
  • Scan imported backup files for potentially malicious script content before restoration
  • Review application logs for unusual note history viewer access patterns

Monitoring Recommendations

  • Enable process creation monitoring to detect child processes spawned by Notesnook
  • Implement file integrity monitoring on critical system directories
  • Configure network monitoring to detect anomalous outbound connections from the application
  • Deploy behavioral analysis to identify JavaScript-based exploitation attempts

How to Mitigate CVE-2026-33955

Immediate Actions Required

  • Update Notesnook Desktop and Web applications to version 3.3.11 or later immediately
  • Audit any recently imported backups or notes from untrusted sources
  • Review system logs for signs of compromise if the vulnerable version was in use
  • Consider reinstalling the application from official sources after updating

Patch Information

Streetwriters has released version 3.3.11 which addresses this vulnerability by implementing proper sanitization for content rendered via dangerouslySetInnerHTML in the note history comparison viewer. Users should update to this version or later through their official distribution channels. For more details, refer to the GitHub Security Advisory.

Workarounds

  • Avoid importing backup files from untrusted or unknown sources until the patch is applied
  • Refrain from using the note history comparison feature until the application is updated
  • Consider using the web version with restricted browser permissions as a temporary alternative
  • Implement application whitelisting to prevent unauthorized child process execution from Notesnook

If immediate patching is not possible, consider restricting Notesnook's network access and disabling the backup restore functionality through organizational policies until the update can be deployed.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechNotesnook Desktop

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-79
  • Vendor Resources
  • GitHub Security Advisory
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English