CVE-2026-35214

Budibase · Budibase

A high-severity vulnerability has been identified in the Budibase open-source low-code platform that could lead to unauthorized access or system compromise.

Executive summary

Budibase is affected by a high-severity vulnerability that could allow attackers to compromise the low-code application environment and its associated data.

Vulnerability

This vulnerability affects the Budibase platform, though the specific technical mechanism is not detailed in the summary. Given the CVSS score of 8.7, it likely involves a flaw in authentication, access control, or remote code execution within the application framework.

Business impact

As a low-code platform, Budibase often handles sensitive business logic and data integrations. A compromise could lead to the exposure of proprietary application data, unauthorized modification of business workflows, and potential access to connected databases. The CVSS score of 8.7 indicates a high risk to the confidentiality and integrity of the platform.

Remediation

Immediate Action: Administrators should update their Budibase instances to the latest secure version immediately to mitigate the risk of exploitation.

Proactive Monitoring: Review application access logs for unusual login activity or unauthorized changes to application schemas and configurations.

Compensating Controls: Ensure that Budibase is deployed behind a robust Web Application Firewall (WAF) and that network access is restricted to authorized IP ranges.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Apply the primary remediation patch immediately. Organizations utilizing Budibase for critical business functions should prioritize this update to prevent unauthorized access to their low-code applications and underlying data sources.