EUVD-2026-18754

| CVE-2026-25044 HIGH
2026-04-03 GitHub_M GHSA-gjw9-34gf-rp6m
8.7
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

4
Patch Released
Apr 04, 2026 - 02:30 nvd
Patch available
EUVD ID Assigned
Apr 03, 2026 - 16:00 euvd
EUVD-2026-18754
Analysis Generated
Apr 03, 2026 - 16:00 vuln.today
CVE Published
Apr 03, 2026 - 15:38 nvd
HIGH 8.7

Description

Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash automation step executes user-provided commands using execSync without proper sanitization or validation. User input is processed through processStringSync which allows template interpolation, potentially allowing arbitrary command execution. This issue has been patched in version 3.33.4.

Analysis

Remote code execution in Budibase low-code platform versions prior to 3.33.4 enables authenticated attackers to execute arbitrary system commands through the bash automation step feature. The vulnerability stems from unsanitized user input processed via template interpolation in execSync calls, allowing command injection with low attack complexity. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

24 hours: Inventory all Budibase deployments and identify instances running versions prior to 3.33.4; document users with automation step privileges. 7 days: Upgrade all Budibase instances to version 3.33.4 or later; if upgrade is not immediately feasible, restrict automation step access to trusted administrator accounts only and disable bash automation steps where possible. …

Sign in for detailed remediation steps.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

EUVD-2026-18754 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy