CVE-2026-35218

Budibase · Budibase

A vulnerability in the Budibase platform could allow for unauthorized actions, potentially leading to a breach of the application environment.

Executive summary

The Budibase low-code platform contains a high-severity flaw that may allow attackers to bypass security controls and access sensitive application data.

Vulnerability

This vulnerability exists within the Budibase open-source platform. Based on the high CVSS score of 8.7, it is likely that the flaw permits an attacker to perform high-impact actions, such as bypassing capability checks or executing unauthorized commands within the application context.

Business impact

A breach of a Budibase instance could result in the loss of critical business data and the disruption of automated workflows. Because these platforms often integrate with multiple third-party services, an attacker could potentially use this vulnerability to move laterally into other connected systems. The high CVSS score underscores the urgent need for remediation.

Remediation

Immediate Action: Update Budibase to the latest version provided by the vendor to address this security vulnerability.

Proactive Monitoring: Monitor database query logs and API request patterns for any signs of anomalous behavior or unauthorized data extraction.

Compensating Controls: Implement strong multi-factor authentication (MFA) for all Budibase users and restrict administrative privileges to the minimum necessary personnel.

Exploitation status

Public Exploit Available: false

Analyst recommendation

It is critical to apply the vendor's security updates immediately. Given the potential for high-impact data compromise, security teams should verify the update across all Budibase deployments to ensure the environment is fully protected against this flaw.