Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)
A stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.
Budibase, an open-source low-code platform, is vulnerable to a stored cross-site scripting (XSS) attack. Prior to version 3.32.5, the Builder Command Palette renders entity names (tables, views, queries, automations) unsanitized, using Svelte’s {@html} directive. This allows an attacker with Builder access to inject arbitrary HTML into the names of database tables, views, queries, or automations. When a Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the injected HTML payload is executed within their browser context. This execution can be leveraged to steal session cookies, leading to full account takeover. The vulnerability, identified as CVE-2026-35218, was patched in Budibase version 3.32.5. Defenders should prioritize upgrading to the patched version.
Attack Chain
- An attacker authenticates to a Budibase instance with Builder access.
- The attacker creates or modifies a database table.
- The attacker injects a malicious HTML payload (e.g.,
<img src=x onerror=alert(document.domain)>) into the table name via the Budibase Builder interface. - The attacker saves the modified table.
- Another authenticated user with Builder access in the same workspace opens the Command Palette (Ctrl+K).
- The Command Palette renders the table name containing the malicious HTML.
- The user’s browser executes the injected HTML, triggering the onerror event and executing JavaScript.
- The JavaScript steals the user’s session cookie and sends it to an attacker-controlled server.
- The attacker uses the stolen session cookie to impersonate the victim user and gain full account access.
Impact
Successful exploitation of this vulnerability can lead to the theft of sensitive user session cookies, allowing an attacker to impersonate legitimate users with Builder access. This can result in unauthorized modification of Budibase applications, exfiltration of sensitive data stored within Budibase, and further compromise of systems integrated with Budibase. The severity is high due to the ease of exploitation for authenticated users and the potential for complete account takeover.
Recommendation
- Upgrade Budibase to version 3.32.5 or later to remediate CVE-2026-35218.
- Implement the Sigma rule
Budibase_Suspicious_Command_Palette_HTMLto detect potential exploitation attempts by monitoring HTTP activity related to the Command Palette. - Enable webserver logging to collect the data required by the Sigma rule
Budibase_Suspicious_Command_Palette_HTML.
Detection coverage 2
Budibase Suspicious Command Palette HTML
highDetects potential XSS exploitation in Budibase by monitoring HTTP requests for the Command Palette that contain suspicious HTML tags in the query parameters.
Budibase Suspicious Entity Creation with HTML
highDetects potential XSS exploitation in Budibase by monitoring HTTP requests related to entity creation that contain suspicious HTML tags in the request body.
Detection queries are kept inside the platform. Get full rules →