CVE-2026-41428

Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a query parameter. For example, POST /api/global/users/search?x=/api/system/status bypasses all authentication because the regex /api/system/status/ matches in the query string portion of the URL. This vulnerability is fixed in 3.35.4.
Configurations

No configuration.

History

24 Apr 2026, 21:16

Type Values Removed Values Added
References () https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf - () https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf -

24 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 20:16

Updated : 2026-04-24 21:16


NVD link : CVE-2026-41428

Mitre link : CVE-2026-41428

CVE.ORG link : CVE-2026-41428


JSON object : View

Products Affected

No product.

CWE
CWE-287

Improper Authentication