Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 31 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Streetwriters notesnook Desktop
|
|
| CPEs | cpe:2.3:a:streetwriters:notesnook_desktop:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Streetwriters notesnook Desktop
|
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Streetwriters
Streetwriters notesnook Web/desktop |
|
| Vendors & Products |
Streetwriters
Streetwriters notesnook Web/desktop |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop, a cross-site scripting vulnerability stored in the note history comparison viewer can escalate to remote code execution in a desktop application. The issue is triggered when an attacker-controlled note header is displayed using `dangerouslySetInnerHTML` without secure handling. When combined with the full backup and restore feature in the desktop application, this becomes remote code execution because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 patches the issue. | |
| Title | Notesnook vulnerable to RCE via stored XSS in Note History diff viewer | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T13:02:56.898Z
Reserved: 2026-03-24T19:50:52.106Z
Link: CVE-2026-33955
Updated: 2026-03-30T18:40:06.902Z
Status : Modified
Published: 2026-03-27T22:16:22.083
Modified: 2026-04-02T14:16:30.127
Link: CVE-2026-33955
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:00:36Z