Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.
References
| Link | Resource |
|---|---|
| https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732 | Patch |
| https://github.com/Budibase/budibase/pull/18236 | Issue Tracking Patch |
| https://github.com/Budibase/budibase/releases/tag/3.33.4 | Product Release Notes |
| https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45 | Exploit Mitigation Vendor Advisory |
Configurations
History
08 Apr 2026, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Budibase
Budibase budibase |
|
| References | () https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732 - Patch | |
| References | () https://github.com/Budibase/budibase/pull/18236 - Issue Tracking, Patch | |
| References | () https://github.com/Budibase/budibase/releases/tag/3.33.4 - Product, Release Notes | |
| References | () https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45 - Exploit, Mitigation, Vendor Advisory | |
| CPE | cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:* |
03 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-03 16:16
Updated : 2026-04-08 21:19
NVD link : CVE-2026-31818
Mitre link : CVE-2026-31818
CVE.ORG link : CVE-2026-31818
JSON object : View
Products Affected
budibase
- budibase
