Description
Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a query parameter. For example, POST /api/global/users/search?x=/api/system/status bypasses all authentication because the regex /api/system/status/ matches in the query string portion of the URL. This vulnerability is fixed in 3.35.4.
Published: 2026-04-24
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication By-pass
Action: Immediate Patch
AI Analysis

Impact

An attacker can bypass Budibase’s authentication middleware by exploiting unanchored regular expressions that compare the request URL, including its query string, against publicly accessible paths. By appending a public endpoint string as a query parameter to a protected route, the regular expression matches and the request is allowed through, granting unauthenticated access to resources protected by the middleware. The flaw is an authentication bypass, corresponding to CWE‑287, and enables an attacker to read, alter, or delete data that should be restricted to authorized users.

Affected Systems

Affected environment is the Budibase open‑source low‑code platform, any deployment using a release older than 3.35.4. The vulnerable component is the authenticated middleware that performs pattern matching against ctx.request.url. Until version 3.35.4 this component mis‑interprets query strings, allowing the bypass. All Budibase installations relying on these releases are exposed.

Risk and Exploitability

The CVSS score is 9.1, indicating critical severity, while the EPSS score is less than 1 %, suggesting low current exploitation probability but non‑zero risk. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely without authentication by crafting a URL that places a known public endpoint into the query string of a protected request. Because the middleware applies the same pattern matching, the request is treated as legitimate, exposing the protected endpoint entirely.

Generated by OpenCVE AI on April 28, 2026 at 05:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Budibase to version 3.35.4 or newer to apply the regex anchoring fix.
  • If an upgrade cannot be performed immediately, block or sanitize requests that contain a question mark followed by a public endpoint pattern using reverse‑proxy rewrite rules or firewall filters.
  • Review custom endpoint configurations and adjust the middleware to enforce anchored regex matching to ensure no remaining unauthenticated access paths.

Generated by OpenCVE AI on April 28, 2026 at 05:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8783-3wgf-jggf Budibase: Authentication Bypass via Unanchored Regex in Public Endpoint Matcher — Unauthenticated Access to Protected Endpoints
History

Tue, 28 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Budibase
Budibase budibase
Vendors & Products Budibase
Budibase budibase

Fri, 24 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a query parameter. For example, POST /api/global/users/search?x=/api/system/status bypasses all authentication because the regex /api/system/status/ matches in the query string portion of the URL. This vulnerability is fixed in 3.35.4.
Title Budibase: Authentication Bypass via Unanchored Regex in Public Endpoint Matcher — Unauthenticated Access to Protected Endpoints
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}


Subscriptions

Budibase Budibase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T20:00:50.097Z

Reserved: 2026-04-20T15:32:33.814Z

Link: CVE-2026-41428

cve-icon Vulnrichment

Updated: 2026-04-24T20:00:46.947Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T20:16:27.523

Modified: 2026-04-28T15:39:13.660

Link: CVE-2026-41428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T06:00:09Z

Weaknesses