Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2914 articles · 109744 vulns · 38/41 feeds (7d)
← Back to list
9.6
CVE-2026-31818PATCHED
budiba · budibase

Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist

Description

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.

Affected Products

VendorProductVersions
budibabudibasenpm/@budibase/backend-core: < 3.33.4

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
open sourcebudibasecert_advisory90%

References

  • https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45(x_refsource_CONFIRM)
  • https://github.com/Budibase/budibase/pull/18236(x_refsource_MISC)
  • https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732(x_refsource_MISC)
  • https://github.com/Budibase/budibase/releases/tag/3.33.4(x_refsource_MISC)

Related News (2 articles)

Tier B
BSI Advisories2d ago
[NEU] [hoch] Budibase: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB6d ago
CVE-2026-31818 | budibase up to 3.33.3 Environment Variable blacklist BLACKLIST_IPS server-side request forgery
→ No new info (linked only)
CVSS 3.19.6 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
@budibase/backend-core@3.33.4
CWECWE-918, CWE-1188
PublishedApr 3, 2026
Last enriched6d agov2
Trending Score41
Source articles2
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-25044EXP
Budibase: Command Injection in Bash Automation Step
Trending: 52
HIGHCVE-2026-35214EXP
Budibase: Path traversal in plugin file upload enables arbitrary directory deletion and file write
Trending: 47
HIGHCVE-2026-25043
Budibase: Unauthenticated Password Reset Endpoint Lacks Rate Limiting, Enabling Email Flooding
Trending: 43
CRITICALCVE-2026-35216
Budibase: Unauthenticated Remote Code Execution via Webhook Trigger and Bash Automation Step
Trending: 41
HIGHCVE-2026-35218
Budibase: Stored XSS via unsanitized entity names rendered with {@html} in Builder Command Palette
Trending: 39

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: description, affectedVersions, patchAvailable
Apr 3, 2026
Patch Available
Apr 3, 2026

Version History

v2
Last enriched 6d ago
v2Tier C6d ago

Updated affected versions to < 3.33.3, corrected exploit availability to false, and added a more detailed description of the vulnerability.

descriptionaffectedVersionspatchAvailable
via VulDB
v16d ago

Initial creation