Critical (9.9)

CVE-2026-27702: Budibase

CVE-2026-27702

Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to version 3.30.4, an unsafe `eval()` vulnerability in Budibase's view filtering implementation allows a...

Overview

A critical security vulnerability in Budibase Cloud (SaaS) allows authenticated users to execute arbitrary code on the server. This flaw could lead to a complete compromise of the application environment and sensitive data.

Vulnerability Details

Budibase is a low-code platform for building internal tools. In versions prior to 3.30.4, a feature for filtering data views used an unsafe eval() function to process user input. This meant any authenticated user, including those on free accounts, could inject and run malicious JavaScript code directly on the Budibase server. The vulnerability is located in the file packages/server/src/db/inMemoryView.ts.

Important Note: This vulnerability only affects Budibase Cloud, the hosted Software-as-a-Service offering. Self-hosted Budibase deployments use a different technical approach and are not vulnerable.

Potential Impact

The impact of this vulnerability is severe. The compromised server pod contains critical environment variables with secrets like:

  • Internal API keys
  • JWT secrets for authentication
  • Full CouchDB database administrator credentials
  • AWS access keys

An attacker could use this code execution to steal these secrets. With the CouchDB credentials, they could directly access the backend database, enumerate all customer data, and exfiltrate sensitive information such as user email addresses and application data. This constitutes a full breach of the application’s security boundary.

Remediation and Mitigation

Immediate action is required for users of Budibase Cloud.

  1. Patch Immediately: The vendor has released a fix in Budibase version 3.30.4. Budibase Cloud has been patched by the vendor. If you are a Cloud customer, no action is needed on your part - the service has been updated.
  2. For Self-Hosted Users: If you operate a self-hosted Budibase instance, you are not affected by this specific vulnerability. However, always ensure you are running the latest stable version for other security and stability improvements.
  3. General Security Hygiene: As a best practice, organizations should review access logs for any unusual activity from the period before the patch was applied. Rotating internal secrets (like JWT_SECRET or API keys) is a recommended step after any potential security incident, though the patched code prevents new exploitation.

Summary

This critical vulnerability in Budibase Cloud allowed user-controlled code execution on the server, risking exposure of all system secrets and data. The SaaS platform has been patched to version 3.30.4. Self-hosted deployments were not vulnerable. Users should confirm their service is updated and consider proactive secret rotation as a precaution.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-27702?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.