<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-46426 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-46426/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 16:33:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-46426/feed.xml" rel="self" type="application/rss+xml"/><item><title>Budibase Stored XSS Vulnerability via Unrestricted File Upload (CVE-2026-46426)</title><link>https://feed.craftedsignal.io/briefs/2026-05-budibase-xss/</link><pubDate>Tue, 19 May 2026 16:33:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-budibase-xss/</guid><description>Budibase is vulnerable to persistent stored XSS (CVE-2026-46426) due to unrestricted file upload of active content by authenticated users, leading to potential session cookie theft and account takeover.</description><content:encoded><![CDATA[<p>Budibase, a low-code platform, is susceptible to a stored cross-site scripting (XSS) vulnerability (CVE-2026-46426) affecting versions prior to 3.38.2. The vulnerability stems from the <code>/api/attachments/process</code> endpoint, which inadequately restricts the upload of files with dangerous content. Authenticated users with builder privileges can upload malicious files, such as SVG files containing inline JavaScript, HTML pages with embedded scripts, or JavaScript modules. These files are stored with correct MIME types in the object store (MinIO/S3). Subsequently, when any application user accesses a screen containing the URL of the uploaded file, the browser executes the malicious payload, potentially leading to session cookie theft and full account takeover. This issue impacts both application end-users and builder accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to Budibase as a user with the Builder role via <code>POST /api/global/auth/default/login</code>.</li>
<li>The server responds with a JWT and CSRF token embedded within the session.</li>
<li>The attacker extracts the CSRF token from the session.</li>
<li>The attacker crafts a malicious SVG file containing an XSS payload, such as <code>&lt;svg xmlns=&quot;http://www.w3.org/2000/svg&quot;&gt;&lt;script&gt;alert(document.domain)&lt;/script&gt;&lt;/svg&gt;</code>.</li>
<li>The attacker uploads the malicious SVG file to the <code>/api/attachments/process</code> endpoint using a <code>POST</code> request with the <code>Content-Type</code> set to <code>multipart/form-data</code> and including the CSRF token.</li>
<li>The server stores the SVG file in the object store (MinIO/S3) with the correct MIME type (<code>image/svg+xml</code>).</li>
<li>The server returns a JSON response containing the URL of the uploaded file, such as <code>http://target:10000/files/signed/.../&lt;uuid&gt;.svg?X-Amz-...</code>.</li>
<li>An end user accesses a screen within the Budibase application that includes the URL of the uploaded SVG file, causing the browser to execute the embedded JavaScript. This results in XSS.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for persistent stored XSS on any screen displaying the attachment URL. Successful exploitation can lead to session cookie theft, resulting in full account takeover for application end-users. Furthermore, if a malicious URL is shared within the workspace, such as in a table attachment or embedded image, the XSS can fire in a builder&rsquo;s session, potentially leading to workspace takeover. The number of affected users depends on the scale of the Budibase application and the visibility of the malicious attachment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Budibase to version 3.38.2 or later to patch CVE-2026-46426.</li>
<li>Deploy the Sigma rule &ldquo;Detect Budibase Suspicious SVG Upload&rdquo; to monitor for the upload of SVG files containing <code>&lt;script&gt;</code> tags.</li>
<li>Deploy the Sigma rule &ldquo;Detect Budibase Attachment Request with SVG Extension&rdquo; to monitor for requests to uploaded SVG attachments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>file-upload</category><category>budibase</category><category>cve-2026-46426</category></item></channel></rss>