Budibase Unauthenticated Remote Code Execution via Webhook
Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.
Budibase, an open-source low-code platform, is vulnerable to remote code execution (RCE) in versions prior to 3.33.4. This vulnerability, identified as CVE-2026-35216, allows an unauthenticated attacker to execute arbitrary commands on the Budibase server. The attack involves leveraging the public webhook endpoint to trigger an automation containing a Bash step. Due to the lack of authentication, malicious actors can directly interact with the webhook to initiate the execution. The process runs as root within the container, increasing the severity of the impact. Budibase patched this vulnerability in version 3.33.4. Defenders must upgrade to the latest version to mitigate this threat.
Attack Chain
- The attacker identifies a Budibase instance running a version prior to 3.33.4.
- The attacker locates a public webhook endpoint exposed by the Budibase instance.
- The attacker crafts a malicious HTTP request targeting the webhook endpoint.
- The crafted request triggers a pre-configured automation within Budibase.
- The automation contains a Bash step that executes attacker-controlled commands.
- The Bash script executes as root within the container.
- The attacker gains control of the Budibase server.
Impact
Successful exploitation of CVE-2026-35216 allows an unauthenticated attacker to achieve remote code execution (RCE) on the affected Budibase server. Since the process executes as root within the container, the attacker gains complete control over the Budibase instance. This can lead to data breaches, service disruption, or further lateral movement within the network. Organizations using vulnerable Budibase versions are at high risk of compromise.
Recommendation
- Upgrade Budibase to version 3.33.4 or later to patch CVE-2026-35216.
- Monitor web server logs for suspicious POST requests to webhook endpoints associated with Budibase to detect exploitation attempts.
- Deploy the Sigma rule provided to detect the execution of bash commands in automations triggered by webhooks.
Detection coverage 2
Detect Budibase Webhook Automation Bash Execution
highDetects the execution of bash commands within Budibase automations potentially triggered by webhooks exploiting CVE-2026-35216
Detect Budibase Webhook Access
mediumDetects access to budibase webhook endpoints
Detection queries are kept inside the platform. Get full rules →