CVE-2026-35216
Published: 03 April 2026
Description
Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is…
more
required to trigger the exploit. The process executes as root inside the container. This issue has been patched in version 3.33.4.
Mitigating Controls (NIST 800-53 r5)AI
Limits permitted actions without identification or authentication, preventing unauthenticated attackers from triggering dangerous Bash automations via the public webhook endpoint.
Validates inputs to the public webhook endpoint to block OS command injection payloads that enable RCE in Bash steps.
Provides specific protections for publicly accessible interfaces like the webhook endpoint to mitigate unauthorized RCE exploitation.
Security SummaryAI
CVE-2026-35216 is a remote code execution (RCE) vulnerability affecting Budibase, an open-source low-code platform, in versions prior to 3.33.4. The flaw stems from CWE-78 (OS Command Injection) and allows an unauthenticated attacker to execute arbitrary code on the Budibase server by triggering an automation workflow containing a Bash step through the public webhook endpoint. The vulnerability carries a CVSS v3.1 base score of 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), reflecting its critical impact despite requiring high attack complexity.
Any unauthenticated remote attacker can exploit this vulnerability without privileges or user interaction by sending a crafted request to the public webhook endpoint, which triggers the malicious automation. Successful exploitation results in RCE on the server, with the Bash process executing as root within the container, potentially granting full control over the host environment, including data exfiltration, persistence, or further lateral movement.
Budibase has addressed the issue in version 3.33.4, as detailed in the official security advisory (GHSA-fcm4-4pj2-m5hf), release notes, associated pull request (#18238), and patching commit (f0c731b409a96e401445a6a6030d2994ff4ac256). Security practitioners should immediately upgrade to 3.33.4 or later and review webhook configurations to disable or restrict unauthenticated automations with Bash steps.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated RCE via OS command injection (CWE-78) in public webhook endpoint of web-facing low-code platform (Budibase), enabling exploitation of public-facing application (T1190) and arbitrary Unix Shell (Bash) command execution (T1059.004).