


Perceptive Security
SOC/SIEM Consultancy

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware t…
Published:
8 maart 2026 om 23:00:00
Alert date:
9 maart 2026 om 22:03:30
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Budibase low-code platform versions 3.31.4 and earlier contain a critical authentication bypass vulnerability in the authorized() middleware. The vulnerability allows remote attackers to bypass all authentication, authorization, role checks, and CSRF protection by appending webhook path patterns to query strings. The isWebhookEndpoint() function uses an unanchored regex against the full URL including query parameters, causing the middleware to skip security controls when webhook patterns are detected. Attackers can exploit this by appending ?/webhooks/trigger or similar patterns to access any server-side API endpoint without authentication.
Technical details
Mitigation steps:
Affected products:
Budibase
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-31816
https://github.com/Budibase/budibase/security/advisories/GHSA-gw94-hprh-4wj8
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
