Description
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions are configured. The restriction is enforced only at the UI level. An attacker can bypass these restrictions and upload malicious files.
Published: 2026-03-09
Score: 8.9 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS and SSRF
Action: Apply Patch
AI Analysis

Impact

Budibase is a low‑code platform that in versions 3.24.0 and earlier suffered an arbitrary file upload flaw. Although administrators can configure file extension restrictions, the enforcement occurs only at the user interface, allowing an attacker to bypass the checks and upload malicious files. This flaw can lead to several high‑severity issues, including stored cross‑site scripting (CWE‑79) and server‑side request forgery (CWE‑918), which can compromise confidentiality, integrity, or availability of the host. The CVSS score of 8.9 reflects the high impact of these consequences.

Affected Systems

The affected product is Budibase, specifically all releases 3.24.0 and earlier. Any deployment of these versions hosts the upload endpoint that enforces only client‑side restrictions, making them susceptible to the flaw.

Risk and Exploitability

The CVSS score of 8.9 indicates a high severity, while the EPSS score of less than 1 % suggests the likelihood of exploitation in the wild is currently low, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is likely a web application access, requiring authenticated or unauthenticated users to reach the upload API. Successful exploitation would grant the attacker the ability to deliver malicious files that can lead to file inclusion, SSRF, or XSS, thereby compromising confidentiality, integrity, or availability of the host.

Generated by OpenCVE AI on April 18, 2026 at 09:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Budibase to a version newer than 3.24.0 that enforces file type checks on the server side.
  • If an immediate upgrade is not possible, restrict the upload interface by disabling or removing the endpoint, or by applying a server‑side file type filter that rejects all non‑trusted extensions.
  • Apply the latest security updates from the Budibase maintainers.
  • Monitor application logs for anomalous file upload activity and block any suspicious traffic.

Generated by OpenCVE AI on April 18, 2026 at 09:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
CWE-918
CPEs cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Budibase
Budibase budibase
Vendors & Products Budibase
Budibase budibase

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions are configured. The restriction is enforced only at the UI level. An attacker can bypass these restrictions and upload malicious files.
Title Budibase Arbitrary File Upload Leading to Multiple Critical Vulnerabilities (SSRF, Stored XSS)
Weaknesses CWE-602
References
Metrics cvssV3_1

{'score': 8.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}


Subscriptions

Budibase Budibase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:34:21.618Z

Reserved: 2026-02-05T16:48:00.427Z

Link: CVE-2026-25737

cve-icon Vulnrichment

Updated: 2026-03-09T20:31:35.682Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T21:16:15.340

Modified: 2026-03-13T19:16:21.893

Link: CVE-2026-25737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:45:25Z

Weaknesses