<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Budibase — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/budibase/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/budibase/feed.xml" rel="self" type="application/rss+xml"/><item><title>Budibase REST Connector SSRF via Empty Blacklist</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-ssrf/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-ssrf/</guid><description>A critical Server-Side Request Forgery (SSRF) vulnerability in Budibase's REST datasource connector allows attackers with Builder privileges to exfiltrate sensitive data from internal network services due to a missing default IP blacklist.</description><content:encoded><![CDATA[<p>A critical Server-Side Request Forgery (SSRF) vulnerability exists in Budibase version 3.30.6, affecting self-hosted instances that do not explicitly configure the <code>BLACKLIST_IPS</code> environment variable. The vulnerability resides within the REST datasource connector and the backend-core blacklist module. Due to the absence of a default IP blacklist, the <code>isBlacklisted()</code> function in <code>packages/backend-core/src/blacklist/blacklist.ts</code> unconditionally returns <code>false</code>, bypassing SSRF protection. This allows users with <code>Builder</code> privileges or <code>QUERY WRITE</code> permissions to create malicious REST datasources, query internal services, and exfiltrate sensitive data, including CouchDB credentials, application data, and internal service metadata. This vulnerability impacts confidentiality, integrity, and availability, potentially leading to complete instance takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with <code>Builder</code> privileges logs into the Budibase application.</li>
<li>The attacker creates a new REST datasource via <code>POST /api/datasources</code>, configuring it to target an internal service like <code>http://couchdb-service:5984</code>.</li>
<li>The Budibase server, specifically the <code>packages/server/src/integrations/rest.ts</code> component, evaluates the URL against the blacklist. Due to the empty <code>BLACKLIST_IPS</code>, the <code>isBlacklisted()</code> function returns <code>false</code>.</li>
<li>The REST integration proceeds with the request using the <code>fetch</code> API, sending the request to the specified internal service.</li>
<li>The internal service (e.g., CouchDB) responds with data.</li>
<li>The attacker creates a query via <code>POST /api/queries</code> that uses the malicious REST datasource.</li>
<li>The attacker executes the query via <code>POST /api/v2/queries/:id</code>, triggering a request to the internal service.</li>
<li>The response from the internal service, containing sensitive data like database credentials or application data, is returned to the attacker, enabling data exfiltration or further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to read CouchDB databases, including user credentials (bcrypt password hashes) and platform configurations. They can also modify user records, create new admin accounts, alter application data, or delete databases. The vulnerability enables resource exhaustion, database destruction, and service disruption. The vulnerability crosses the security boundary between the Budibase application layer and the infrastructure layer, granting access to CouchDB, MinIO, Redis, and other internal services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately set the <code>BLACKLIST_IPS</code> environment variable in your Budibase deployment to include at least <code>127.0.0.1</code>, private IP ranges (<code>10.0.0.0/8</code>, <code>172.16.0.0/12</code>, <code>192.168.0.0/16</code>), link-local addresses (<code>169.254.0.0/16</code>), and cloud metadata endpoints to mitigate the SSRF vulnerability.</li>
<li>Restrict <code>BUILDER</code> role access to only trusted users. Consider using the principle of least privilege for application-level permissions.</li>
<li>Deploy the Sigma rule &ldquo;Detect Budibase REST Datasource Creation Targeting Internal IPs&rdquo; to your SIEM and tune for your environment to detect potential exploitation attempts.</li>
<li>If you have unpatched instances of Budibase and have granted <code>QUERY WRITE</code> permissions widely, immediately audit and revoke those permissions from untrusted users.</li>
<li>Monitor webserver logs for unusual requests originating from the Budibase application server to internal IP addresses or services, particularly those used by CouchDB, Redis, or MinIO, to identify potential SSRF attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>budibase</category><category>vulnerability</category></item><item><title>Budibase Command Injection Vulnerability in Bash Automation Step</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-cmd-injection/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-cmd-injection/</guid><description>A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.</description><content:encoded><![CDATA[<p>A command injection vulnerability has been identified in Budibase versions prior to 3.33.4, specifically within the bash automation step located in <code>packages/server/src/automations/steps/bash.ts</code>. This flaw allows an attacker with permissions to create or modify automation workflows to inject arbitrary shell commands. The vulnerability stems from the usage of <code>execSync</code> to execute user-supplied commands without adequate sanitization or validation. Input is processed through <code>processStringSync</code>, enabling template interpolation that can be exploited for command injection. Successful exploitation could lead to remote code execution, complete system compromise, data exfiltration, and lateral movement within the affected infrastructure. Defenders should prioritize patching or implementing mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the Budibase platform with the ability to create or modify automation workflows.</li>
<li>The attacker crafts a malicious payload containing shell commands embedded within template syntax (e.g., <code>$(rm -rf /)</code>, <code>; malicious-command</code>, <code>| malicious-command</code>).</li>
<li>The attacker injects the malicious payload into the <code>inputs.code</code> field of a bash automation step.</li>
<li>The <code>processStringSync</code> function processes the user-supplied input, interpolating the template syntax and generating a command string.</li>
<li>The <code>execSync</code> function executes the crafted command string without proper sanitization.</li>
<li>The injected shell commands execute on the server with the privileges of the Budibase application.</li>
<li>The attacker achieves remote code execution, potentially gaining control of the server.</li>
<li>The attacker can then perform actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to severe consequences, including remote code execution (RCE) on the Budibase server. This could result in complete system compromise, allowing attackers to steal sensitive data, modify system configurations, or use the compromised system as a pivot point for further attacks within the network. While the exact number of affected organizations is unknown, any Budibase instance running a version prior to 3.33.4 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately disable the bash automation step in production environments to prevent further exploitation.</li>
<li>Upgrade Budibase to version 3.33.4 or later, where this vulnerability is addressed.</li>
<li>Implement the command sanitization and validation techniques outlined in the provided example fix.</li>
<li>If upgrading is not immediately feasible, implement a whitelist of allowed commands to restrict the functionality of the bash automation step.</li>
<li>Enable and review Budibase application logs for any unusual or suspicious command execution patterns (reference: Overview section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>budibase</category></item><item><title>Budibase Unauthenticated Remote Code Execution via Webhook</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-rce/</link><pubDate>Fri, 03 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-rce/</guid><description>Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.</description><content:encoded><![CDATA[<p>Budibase, an open-source low-code platform, is vulnerable to remote code execution (RCE) in versions prior to 3.33.4. This vulnerability, identified as CVE-2026-35216, allows an unauthenticated attacker to execute arbitrary commands on the Budibase server. The attack involves leveraging the public webhook endpoint to trigger an automation containing a Bash step. Due to the lack of authentication, malicious actors can directly interact with the webhook to initiate the execution. The process runs as root within the container, increasing the severity of the impact. Budibase patched this vulnerability in version 3.33.4. Defenders must upgrade to the latest version to mitigate this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Budibase instance running a version prior to 3.33.4.</li>
<li>The attacker locates a public webhook endpoint exposed by the Budibase instance.</li>
<li>The attacker crafts a malicious HTTP request targeting the webhook endpoint.</li>
<li>The crafted request triggers a pre-configured automation within Budibase.</li>
<li>The automation contains a Bash step that executes attacker-controlled commands.</li>
<li>The Bash script executes as root within the container.</li>
<li>The attacker gains control of the Budibase server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35216 allows an unauthenticated attacker to achieve remote code execution (RCE) on the affected Budibase server. Since the process executes as root within the container, the attacker gains complete control over the Budibase instance. This can lead to data breaches, service disruption, or further lateral movement within the network. Organizations using vulnerable Budibase versions are at high risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Budibase to version 3.33.4 or later to patch CVE-2026-35216.</li>
<li>Monitor web server logs for suspicious POST requests to webhook endpoints associated with Budibase to detect exploitation attempts.</li>
<li>Deploy the Sigma rule provided to detect the execution of bash commands in automations triggered by webhooks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-35216</category><category>budibase</category><category>rce</category><category>webhook</category></item><item><title>Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-xss/</link><pubDate>Fri, 03 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.</description><content:encoded><![CDATA[<p>Budibase, an open-source low-code platform, is vulnerable to a stored cross-site scripting (XSS) attack. Prior to version 3.32.5, the Builder Command Palette renders entity names (tables, views, queries, automations) unsanitized, using Svelte&rsquo;s {@html} directive. This allows an attacker with Builder access to inject arbitrary HTML into the names of database tables, views, queries, or automations. When a Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the injected HTML payload is executed within their browser context. This execution can be leveraged to steal session cookies, leading to full account takeover. The vulnerability, identified as CVE-2026-35218, was patched in Budibase version 3.32.5. Defenders should prioritize upgrading to the patched version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a Budibase instance with Builder access.</li>
<li>The attacker creates or modifies a database table.</li>
<li>The attacker injects a malicious HTML payload (e.g., <code>&lt;img src=x onerror=alert(document.domain)&gt;</code>) into the table name via the Budibase Builder interface.</li>
<li>The attacker saves the modified table.</li>
<li>Another authenticated user with Builder access in the same workspace opens the Command Palette (Ctrl+K).</li>
<li>The Command Palette renders the table name containing the malicious HTML.</li>
<li>The user&rsquo;s browser executes the injected HTML, triggering the onerror event and executing JavaScript.</li>
<li>The JavaScript steals the user&rsquo;s session cookie and sends it to an attacker-controlled server.</li>
<li>The attacker uses the stolen session cookie to impersonate the victim user and gain full account access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the theft of sensitive user session cookies, allowing an attacker to impersonate legitimate users with Builder access. This can result in unauthorized modification of Budibase applications, exfiltration of sensitive data stored within Budibase, and further compromise of systems integrated with Budibase. The severity is high due to the ease of exploitation for authenticated users and the potential for complete account takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Budibase to version 3.32.5 or later to remediate CVE-2026-35218.</li>
<li>Implement the Sigma rule <code>Budibase_Suspicious_Command_Palette_HTML</code> to detect potential exploitation attempts by monitoring HTTP activity related to the Command Palette.</li>
<li>Enable webserver logging to collect the data required by the Sigma rule <code>Budibase_Suspicious_Command_Palette_HTML</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>budibase</category><category>xss</category><category>cve-2026-35218</category><category>web-application</category></item><item><title>Budibase Path Traversal Vulnerability in Plugin Upload</title><link>https://feed.craftedsignal.io/briefs/2024-05-budibase-traversal/</link><pubDate>Fri, 03 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-budibase-traversal/</guid><description>A path traversal vulnerability exists in Budibase versions prior to 3.33.4, allowing attackers with Global Builder privileges to delete arbitrary directories and write arbitrary files via crafted plugin uploads.</description><content:encoded><![CDATA[<p>Budibase, an open-source low-code platform, is vulnerable to a path traversal attack in versions prior to 3.33.4. This flaw resides in the plugin file upload endpoint (POST /api/plugin/upload), where the user-supplied filename is passed unsanitized to createTempFolder(). An attacker with Global Builder privileges can exploit this by crafting a multipart upload containing &ldquo;../&rdquo; sequences in the filename. This allows them to manipulate file paths, leading to arbitrary directory deletion via rmSync and arbitrary file write via tarball extraction. The attacker can write files to any filesystem path accessible by the Node.js process running Budibase. This vulnerability has been patched in version 3.33.4, and organizations using older versions are at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains Global Builder privileges within a vulnerable Budibase instance (version &lt; 3.33.4).</li>
<li>The attacker crafts a multipart upload request targeting the <code>/api/plugin/upload</code> endpoint (POST request).</li>
<li>Within the multipart form data, the attacker includes a filename parameter.</li>
<li>The filename parameter contains path traversal sequences such as &ldquo;../&rdquo; to manipulate the file path.</li>
<li>The Budibase application passes the unsanitized filename to the <code>createTempFolder()</code> function.</li>
<li>The manipulated path is then used in subsequent file system operations, such as <code>rmSync</code> (for deleting directories) and tarball extraction.</li>
<li>The attacker leverages <code>rmSync</code> with the manipulated path to delete arbitrary directories on the server.</li>
<li>Alternatively, the attacker leverages tarball extraction to write arbitrary files to arbitrary locations on the server, leading to potential code execution or data compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with Global Builder privileges to perform arbitrary file system operations on the Budibase server. This includes the ability to delete arbitrary directories, potentially causing denial of service, and write arbitrary files, potentially leading to remote code execution. The impact is significant as it could allow for complete system compromise if the attacker can overwrite critical system files or deploy malicious code. This is especially dangerous for organizations relying on Budibase for critical business applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Budibase to version 3.33.4 or later to patch the CVE-2026-35214 vulnerability.</li>
<li>Monitor web server logs for POST requests to the <code>/api/plugin/upload</code> endpoint containing filenames with &ldquo;../&rdquo; sequences using the Sigma rule provided.</li>
<li>Implement strict access control policies to limit the number of users with Global Builder privileges within Budibase.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>budibase</category></item></channel></rss>