Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as root inside the container. This issue has been patched in version 3.33.4.
References
| Link | Resource |
|---|---|
| https://github.com/Budibase/budibase/commit/f0c731b409a96e401445a6a6030d2994ff4ac256 | Patch |
| https://github.com/Budibase/budibase/pull/18238 | Issue Tracking Patch |
| https://github.com/Budibase/budibase/releases/tag/3.33.4 | Product Release Notes |
| https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf | Exploit Vendor Advisory |
| https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf | Exploit Vendor Advisory |
Configurations
History
08 Apr 2026, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Budibase
Budibase budibase |
|
| CPE | cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Budibase/budibase/commit/f0c731b409a96e401445a6a6030d2994ff4ac256 - Patch | |
| References | () https://github.com/Budibase/budibase/pull/18238 - Issue Tracking, Patch | |
| References | () https://github.com/Budibase/budibase/releases/tag/3.33.4 - Product, Release Notes | |
| References | () https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf - Exploit, Vendor Advisory |
03 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf - |
03 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-03 16:16
Updated : 2026-04-08 21:19
NVD link : CVE-2026-35216
Mitre link : CVE-2026-35216
CVE.ORG link : CVE-2026-35216
JSON object : View
Products Affected
budibase
- budibase
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
