Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a query parameter. For example, POST /api/global/users/search?x=/api/system/status bypasses all authentication because the regex /api/system/status/ matches in the query string portion of the URL. This vulnerability is fixed in 3.35.4.
References
Configurations
No configuration.
History
24 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf - |
24 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 20:16
Updated : 2026-04-24 21:16
NVD link : CVE-2026-41428
Mitre link : CVE-2026-41428
CVE.ORG link : CVE-2026-41428
JSON object : View
Products Affected
No product.
CWE
CWE-287
Improper Authentication
