Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash automation step executes user-provided commands using execSync without proper sanitization or validation. User input is processed through processStringSync which allows template interpolation, potentially allowing arbitrary command execution. This issue has been patched in version 3.33.4.
References
| Link | Resource |
|---|---|
| https://github.com/Budibase/budibase/releases/tag/3.33.2 | Product Release Notes |
| https://github.com/Budibase/budibase/security/advisories/GHSA-gjw9-34gf-rp6m | Mitigation Vendor Advisory |
Configurations
History
08 Apr 2026, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Budibase
Budibase budibase |
|
| CPE | cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://github.com/Budibase/budibase/releases/tag/3.33.2 - Product, Release Notes | |
| References | () https://github.com/Budibase/budibase/security/advisories/GHSA-gjw9-34gf-rp6m - Mitigation, Vendor Advisory |
03 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-03 16:16
Updated : 2026-04-08 21:19
NVD link : CVE-2026-25044
Mitre link : CVE-2026-25044
CVE.ORG link : CVE-2026-25044
JSON object : View
Products Affected
budibase
- budibase
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
