<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Budibase/Worker (&lt; 3.38.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@budibase/worker--3.38.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:44:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@budibase/worker--3.38.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Budibase Builder-to-Admin Privilege Escalation via Unsecured onboardUsers Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-05-budibase-privesc/</link><pubDate>Mon, 18 May 2026 17:44:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-budibase-privesc/</guid><description>A privilege escalation vulnerability exists in Budibase's `onboardUsers` endpoint (CVE-2026-45716) allowing a builder-level user to create global admin accounts by bypassing the intended invite flow when SMTP is not configured, due to insufficient authorization checks and direct user creation with attacker-controlled roles.</description><content:encoded><![CDATA[<p>A privilege escalation vulnerability (CVE-2026-45716) has been identified in Budibase versions prior to 3.38.1. The vulnerability resides in the <code>/api/global/users/onboard</code> endpoint, which is intended for onboarding users. However, when SMTP email configuration is absent (the default in self-hosted instances), the endpoint bypasses the typical admin-restricted invite flow. This allows a user with builder-level permissions to directly create new users with arbitrary roles, including global admin, using the <code>bulkCreate</code> function. The generated password for the new admin account is returned in the HTTP response. This vulnerability allows a low-privileged user to gain full administrative control over the Budibase platform.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Budibase instance with a builder-level account.</li>
<li>The attacker crafts a POST request to the <code>/api/global/users/onboard</code> endpoint.</li>
<li>The request body includes a JSON payload specifying a new user account with the <code>admin</code> role set to <code>true</code> for the global scope.</li>
<li>The <code>workspaceBuilderOrAdmin</code> middleware incorrectly authorizes the request due to the absence of a <code>workspaceId</code> parameter and the worker context.</li>
<li>The <code>onboardUsers</code> controller checks if SMTP is configured. Since it&rsquo;s not (default self-hosted setup), it skips the intended admin-only invitation path.</li>
<li>The controller directly creates a new user with the attacker-specified <code>admin</code> role using the <code>bulkCreate</code> function, without adequate permission validation.</li>
<li>The generated password for the new admin user is included in the HTTP response to the attacker.</li>
<li>The attacker uses the newly created admin account&rsquo;s credentials to log in and gain complete administrative access to the Budibase platform.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows any builder-level user to escalate their privileges to a global administrator on self-hosted Budibase instances that do not have SMTP configured. A successful attacker gains full platform compromise, including access to all apps, data sources, user management capabilities, and the ability to delete apps or modify platform configurations. The exposure of the generated password in the HTTP response provides immediate access to the new admin account, compounding the severity. This vulnerability affects a significant portion of self-hosted Budibase instances due to the default configuration without SMTP.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Budibase to version 3.38.1 or later to patch CVE-2026-45716.</li>
<li>Implement the recommended fix by modifying <code>/packages/worker/src/api/routes/global/users.ts</code> to move the <code>onboardUsers</code> route to <code>adminRoutes</code> as described in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Budibase onboardUsers Endpoint Abuse&rdquo; to identify exploitation attempts.</li>
<li>Review existing user accounts and roles, focusing on builder-level accounts, for any signs of unauthorized privilege escalation using the steps outlined in the Attack Chain.</li>
<li>Configure SMTP to prevent the vulnerable code path from being executed; however, this does not address the underlying authorization issue.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>budibase</category></item></channel></rss>