top of page
perceptive_background_267k.jpg

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware t…

Published:

8 maart 2026 om 23:00:00

Alert date:

9 maart 2026 om 22:03:30

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

Budibase low-code platform versions 3.31.4 and earlier contain a critical authentication bypass vulnerability in the authorized() middleware. The vulnerability allows remote attackers to bypass all authentication, authorization, role checks, and CSRF protection by appending webhook path patterns to query strings. The isWebhookEndpoint() function uses an unanchored regex against the full URL including query parameters, causing the middleware to skip security controls when webhook patterns are detected. Attackers can exploit this by appending ?/webhooks/trigger or similar patterns to access any server-side API endpoint without authentication.

Technical details

Mitigation steps:

Affected products:

Budibase

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page