


Perceptive Security
SOC/SIEM Consultancy

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource c…
Published:
2 april 2026 om 22:00:00
Alert date:
3 april 2026 om 17:05:03
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
A server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector prior to version 3.33.4. The vulnerability occurs because the BLACKLIST_IPS environment variable is not set by default in official deployment configurations, making the SSRF protection mechanism completely ineffective. When the variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This creates a significant security risk as attackers can potentially access internal resources or perform unauthorized requests. The issue has been patched in version 3.33.4.
Technical details
Mitigation steps:
Affected products:
Budibase
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-31818
https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732
https://github.com/Budibase/budibase/pull/18236
https://github.com/Budibase/budibase/releases/tag/3.33.4
https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
