CVE-2026-35214

Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbitrary files via tarball extraction to any filesystem path the Node.js process can access. This issue has been patched in version 3.33.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*

History

08 Apr 2026, 21:19

Type Values Removed Values Added
First Time Budibase
Budibase budibase
References () https://github.com/Budibase/budibase/commit/6344d06d703660fd05995e61d581593c2349c879 - () https://github.com/Budibase/budibase/commit/6344d06d703660fd05995e61d581593c2349c879 - Patch
References () https://github.com/Budibase/budibase/pull/18240 - () https://github.com/Budibase/budibase/pull/18240 - Issue Tracking, Patch
References () https://github.com/Budibase/budibase/releases/tag/3.33.4 - () https://github.com/Budibase/budibase/releases/tag/3.33.4 - Product, Release Notes
References () https://github.com/Budibase/budibase/security/advisories/GHSA-2wfh-rcwf-wh23 - () https://github.com/Budibase/budibase/security/advisories/GHSA-2wfh-rcwf-wh23 - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*

03 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 16:16

Updated : 2026-04-08 21:19


NVD link : CVE-2026-35214

Mitre link : CVE-2026-35214

CVE.ORG link : CVE-2026-35214


JSON object : View

Products Affected

budibase

  • budibase
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')