Budibase

7 CVEs product

Monthly

CVE-2026-31816 CRITICAL POC Act Now

Authorization bypass in Budibase 3.31.4 and earlier. The authorized() middleware can be bypassed, enabling injection attacks. PoC available.

CSRF Budibase
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-30240 CRITICAL Act Now

Path traversal in Budibase low-code platform 3.31.5 and earlier allows attackers to read arbitrary files through the application builder.

Path Traversal Budibase
NVD GitHub VulDB
CVSS 3.1
9.6
EPSS
0.0%
CVE-2026-25737 HIGH This Week

Arbitrary file upload in Budibase 3.24.0 and earlier allows authenticated attackers to bypass UI-level file extension restrictions and upload malicious files by directly manipulating requests. An attacker with valid credentials can circumvent the intended upload controls to potentially execute arbitrary code or compromise system integrity. No patch is currently available for this vulnerability.

File Upload Budibase
NVD GitHub VulDB
CVSS 3.1
8.9
EPSS
0.1%
CVE-2026-25045 HIGH This Week

Budibase suffers from missing server-side role validation in user management APIs, allowing Creator-level users to escalate privileges and perform unauthorized actions reserved for Tenant Admins and Owners. An authenticated attacker with Creator permissions can promote themselves to Tenant Admin, demote existing administrators, modify owner accounts, and manipulate organizational orders, resulting in complete tenant compromise. No patch is currently available for this high-severity vulnerability.

Privilege Escalation Authentication Bypass Budibase
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25041 HIGH PATCH This Week

Command injection in Budibase 3.23.22 and earlier allows authenticated attackers with high privileges to execute arbitrary system commands by injecting malicious values into PostgreSQL connection parameters that are unsanitized in shell command construction. An attacker with administrative access can exploit this vulnerability to gain complete control over the underlying server hosting the Budibase instance. No patch is currently available for this vulnerability.

PostgreSQL Command Injection Budibase
NVD GitHub VulDB
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-27702 CRITICAL POC PATCH Act Now

Unauthorized data access in Budibase low-code platform before 3.30.4 allows unauthenticated users to manipulate internal state. PoC and patch available.

Aws Budibase
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-25040 HIGH POC This Week

Budibase is a low code platform for creating internal tools, workflows, and admin panels. [CVSS 8.8 HIGH]

Privilege Escalation Budibase
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-31816
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Authorization bypass in Budibase 3.31.4 and earlier. The authorized() middleware can be bypassed, enabling injection attacks. PoC available.

CSRF Budibase
NVD GitHub
CVE-2026-30240
EPSS 0% CVSS 9.6
CRITICAL Act Now

Path traversal in Budibase low-code platform 3.31.5 and earlier allows attackers to read arbitrary files through the application builder.

Path Traversal Budibase
NVD GitHub VulDB
CVE-2026-25737
EPSS 0% CVSS 8.9
HIGH This Week

Arbitrary file upload in Budibase 3.24.0 and earlier allows authenticated attackers to bypass UI-level file extension restrictions and upload malicious files by directly manipulating requests. An attacker with valid credentials can circumvent the intended upload controls to potentially execute arbitrary code or compromise system integrity. No patch is currently available for this vulnerability.

File Upload Budibase
NVD GitHub VulDB
CVE-2026-25045
EPSS 0% CVSS 8.8
HIGH This Week

Budibase suffers from missing server-side role validation in user management APIs, allowing Creator-level users to escalate privileges and perform unauthorized actions reserved for Tenant Admins and Owners. An authenticated attacker with Creator permissions can promote themselves to Tenant Admin, demote existing administrators, modify owner accounts, and manipulate organizational orders, resulting in complete tenant compromise. No patch is currently available for this high-severity vulnerability.

Privilege Escalation Authentication Bypass Budibase
NVD GitHub VulDB
CVE-2026-25041
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Command injection in Budibase 3.23.22 and earlier allows authenticated attackers with high privileges to execute arbitrary system commands by injecting malicious values into PostgreSQL connection parameters that are unsanitized in shell command construction. An attacker with administrative access can exploit this vulnerability to gain complete control over the underlying server hosting the Budibase instance. No patch is currently available for this vulnerability.

PostgreSQL Command Injection Budibase
NVD GitHub VulDB
CVE-2026-27702
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

Unauthorized data access in Budibase low-code platform before 3.30.4 allows unauthenticated users to manipulate internal state. PoC and patch available.

Aws Budibase
NVD GitHub
CVE-2026-25040
EPSS 0% CVSS 8.8
HIGH POC This Week

Budibase is a low code platform for creating internal tools, workflows, and admin panels. [CVSS 8.8 HIGH]

Privilege Escalation Budibase
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy