CVE-2026-35216

Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as root inside the container. This issue has been patched in version 3.33.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*

History

08 Apr 2026, 21:19

Type Values Removed Values Added
First Time Budibase
Budibase budibase
CPE cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*
References () https://github.com/Budibase/budibase/commit/f0c731b409a96e401445a6a6030d2994ff4ac256 - () https://github.com/Budibase/budibase/commit/f0c731b409a96e401445a6a6030d2994ff4ac256 - Patch
References () https://github.com/Budibase/budibase/pull/18238 - () https://github.com/Budibase/budibase/pull/18238 - Issue Tracking, Patch
References () https://github.com/Budibase/budibase/releases/tag/3.33.4 - () https://github.com/Budibase/budibase/releases/tag/3.33.4 - Product, Release Notes
References () https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf - () https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf - Exploit, Vendor Advisory

03 Apr 2026, 17:16

Type Values Removed Values Added
References () https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf - () https://github.com/Budibase/budibase/security/advisories/GHSA-fcm4-4pj2-m5hf -

03 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 16:16

Updated : 2026-04-08 21:19


NVD link : CVE-2026-35216

Mitre link : CVE-2026-35216

CVE.ORG link : CVE-2026-35216


JSON object : View

Products Affected

budibase

  • budibase
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')