CVE-2026-33976: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in streetwriters Notesnook Web/Desktop
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.
AI Analysis
Technical Summary
CVE-2026-33976 is a critical security vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-94 (Improper Control of Generation of Code) affecting the Notesnook note-taking application. The flaw exists in the Web Clipper feature, which preserves attacker-controlled attributes from the source page's root element and stores them within the clipped HTML content. When this clipped content is later opened in Notesnook, it is rendered inside a same-origin, unsandboxed iframe using the JavaScript method contentDocument.write(). This rendering approach allows event-handler attributes such as onload, onclick, or onmouseover embedded in the clipped HTML to execute within the Notesnook origin context. In the desktop version of Notesnook, which is built on Electron, the vulnerability escalates to remote code execution because Electron is configured insecurely with nodeIntegration set to true and contextIsolation set to false. This configuration allows malicious scripts to access Node.js APIs and the underlying operating system, enabling full compromise of the host system. The vulnerability affects all versions prior to 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS. The issue was publicly disclosed on March 27, 2026, with a CVSS v3.1 score of 9.7 (critical), reflecting its high impact on confidentiality, integrity, and availability, ease of exploitation (no privileges required, user interaction needed), and broad scope due to the widespread use of Notesnook. No known exploits have been reported in the wild yet, but the risk remains significant given the potential for remote code execution. The vendor has released patches in the specified versions to remediate the vulnerability by properly sanitizing input and adjusting rendering methods to prevent execution of attacker-controlled code.
Potential Impact
The impact of CVE-2026-33976 is severe for organizations using vulnerable versions of Notesnook. Successful exploitation allows attackers to execute arbitrary code remotely on the victim’s desktop system, potentially leading to full system compromise. This can result in unauthorized access to sensitive notes and data, installation of malware or ransomware, lateral movement within corporate networks, and disruption of business operations. The vulnerability also threatens confidentiality, integrity, and availability of information stored or processed by Notesnook. Given Notesnook’s role as a productivity and note-taking tool, attackers could leverage this flaw to steal intellectual property, credentials, or other sensitive information. The risk extends to mobile platforms (Android/iOS) where similar clipping functionality exists, though the RCE impact is primarily critical on desktop due to Electron’s configuration. Organizations with remote or hybrid workforces using Notesnook are particularly at risk, as attackers can exploit this vulnerability via crafted web clips or malicious content shared through collaboration channels. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability’s high CVSS score and ease of exploitation make it a prime target for attackers once weaponized.
Mitigation Recommendations
To mitigate CVE-2026-33976, organizations must immediately upgrade Notesnook to version 3.3.11 or later on Web/Desktop and 3.3.17 or later on Android/iOS, where the vulnerability is patched. Beyond patching, organizations should implement strict content sanitization and validation policies for any user-generated or third-party content, especially web clips or embedded HTML. Electron applications should be configured securely by disabling nodeIntegration and enabling contextIsolation to prevent malicious scripts from accessing Node.js APIs. Employ sandboxing techniques for iframes rendering untrusted content to isolate execution contexts. Additionally, monitor and restrict the use of web clipping features to trusted sources and educate users about the risks of clipping content from untrusted websites. Network-level protections such as endpoint detection and response (EDR) solutions can help detect anomalous behavior indicative of exploitation attempts. Regularly audit and review application configurations and dependencies to ensure adherence to security best practices. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Japan, South Korea, Brazil
CVE-2026-33976: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in streetwriters Notesnook Web/Desktop
Description
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33976 is a critical security vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-94 (Improper Control of Generation of Code) affecting the Notesnook note-taking application. The flaw exists in the Web Clipper feature, which preserves attacker-controlled attributes from the source page's root element and stores them within the clipped HTML content. When this clipped content is later opened in Notesnook, it is rendered inside a same-origin, unsandboxed iframe using the JavaScript method contentDocument.write(). This rendering approach allows event-handler attributes such as onload, onclick, or onmouseover embedded in the clipped HTML to execute within the Notesnook origin context. In the desktop version of Notesnook, which is built on Electron, the vulnerability escalates to remote code execution because Electron is configured insecurely with nodeIntegration set to true and contextIsolation set to false. This configuration allows malicious scripts to access Node.js APIs and the underlying operating system, enabling full compromise of the host system. The vulnerability affects all versions prior to 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS. The issue was publicly disclosed on March 27, 2026, with a CVSS v3.1 score of 9.7 (critical), reflecting its high impact on confidentiality, integrity, and availability, ease of exploitation (no privileges required, user interaction needed), and broad scope due to the widespread use of Notesnook. No known exploits have been reported in the wild yet, but the risk remains significant given the potential for remote code execution. The vendor has released patches in the specified versions to remediate the vulnerability by properly sanitizing input and adjusting rendering methods to prevent execution of attacker-controlled code.
Potential Impact
The impact of CVE-2026-33976 is severe for organizations using vulnerable versions of Notesnook. Successful exploitation allows attackers to execute arbitrary code remotely on the victim’s desktop system, potentially leading to full system compromise. This can result in unauthorized access to sensitive notes and data, installation of malware or ransomware, lateral movement within corporate networks, and disruption of business operations. The vulnerability also threatens confidentiality, integrity, and availability of information stored or processed by Notesnook. Given Notesnook’s role as a productivity and note-taking tool, attackers could leverage this flaw to steal intellectual property, credentials, or other sensitive information. The risk extends to mobile platforms (Android/iOS) where similar clipping functionality exists, though the RCE impact is primarily critical on desktop due to Electron’s configuration. Organizations with remote or hybrid workforces using Notesnook are particularly at risk, as attackers can exploit this vulnerability via crafted web clips or malicious content shared through collaboration channels. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability’s high CVSS score and ease of exploitation make it a prime target for attackers once weaponized.
Mitigation Recommendations
To mitigate CVE-2026-33976, organizations must immediately upgrade Notesnook to version 3.3.11 or later on Web/Desktop and 3.3.17 or later on Android/iOS, where the vulnerability is patched. Beyond patching, organizations should implement strict content sanitization and validation policies for any user-generated or third-party content, especially web clips or embedded HTML. Electron applications should be configured securely by disabling nodeIntegration and enabling contextIsolation to prevent malicious scripts from accessing Node.js APIs. Employ sandboxing techniques for iframes rendering untrusted content to isolate execution contexts. Additionally, monitor and restrict the use of web clipping features to trusted sources and educate users about the risks of clipping content from untrusted websites. Network-level protections such as endpoint detection and response (EDR) solutions can help detect anomalous behavior indicative of exploitation attempts. Regularly audit and review application configurations and dependencies to ensure adherence to security best practices. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-24T22:20:06.210Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c6fa4f3c064ed76ffa5f15
Added to database: 3/27/2026, 9:44:47 PM
Last enriched: 3/27/2026, 9:52:23 PM
Last updated: 3/28/2026, 1:01:45 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.