Description
Budibase is an open-source low-code platform. Prior to version 3.23.25, a business logic vulnerability exists in Budibase’s password reset functionality due to the absence of rate limiting, CAPTCHA, or abuse prevention mechanisms on the “Forgot Password” endpoint. An unauthenticated attacker can repeatedly trigger password reset requests for the same email address, resulting in hundreds of password reset emails being sent in a short time window. This enables large-scale email flooding, user harassment, denial of service (DoS) against user inboxes, and potential financial and reputational impact for Budibase. This issue has been patched in version 3.23.25.
Published: 2026-04-03
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Password reset email flooding and denial of service to user inboxes
Action: Immediate Patch
AI Analysis

Impact

Budibase’s Forgot Password endpoint lacks any form of request throttling or abuse prevention. As a result, an unauthenticated attacker can repeatedly submit reset requests for the same e‑mail address, causing the system to send an excessive number of password‑reset emails. The volume of messages can overwhelm user inboxes, trigger spam filters, and create a denial‑of‑service against the affected user’s mail account. This constitutes a business‑logic weakness that can lead to user harassment and reputational damage for the platform provider.

Affected Systems

All users running Budibase before the 3.23.25 release are affected, regardless of deployment environment. The weakness resides in the open‑source low‑code platform’s API layer, making every publicly reachable instance vulnerable if it has the unpatched reset endpoint available. No specific platform segment is exempt; the exploit can be attempted by anyone with internet access.

Risk and Exploitability

The CVSS base score of 5.3 places the issue in the medium‑severity range, reflecting moderate impact on availability. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation has not yet been observed. Nevertheless, the absence of authentication requirements and the lack of rate‑limiting make the attack trivial once the target is known. A potential attacker can issue repeated requests in a loop, causing rapid email flooding without needing any further prerequisites.

Generated by OpenCVE AI on April 3, 2026 at 19:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Budibase to version 3.23.25 or later, which includes rate limiting for the password reset endpoint.
  • If an upgrade cannot be performed immediately, implement temporary controls such as an IP‑based request cap or a CAPTCHA on the Forgot Password page to reduce abuse.

Generated by OpenCVE AI on April 3, 2026 at 19:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Budibase
Budibase budibase
Vendors & Products Budibase
Budibase budibase

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Budibase is an open-source low-code platform. Prior to version 3.23.25, a business logic vulnerability exists in Budibase’s password reset functionality due to the absence of rate limiting, CAPTCHA, or abuse prevention mechanisms on the “Forgot Password” endpoint. An unauthenticated attacker can repeatedly trigger password reset requests for the same email address, resulting in hundreds of password reset emails being sent in a short time window. This enables large-scale email flooding, user harassment, denial of service (DoS) against user inboxes, and potential financial and reputational impact for Budibase. This issue has been patched in version 3.23.25.
Title Budibase: Unauthenticated Password Reset Endpoint Lacks Rate Limiting, Enabling Email Flooding
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Budibase Budibase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:11:18.857Z

Reserved: 2026-01-28T14:50:47.886Z

Link: CVE-2026-25043

cve-icon Vulnrichment

Updated: 2026-04-03T16:09:07.643Z

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:35.607

Modified: 2026-04-03T16:16:35.607

Link: CVE-2026-25043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:16Z

Weaknesses