CVE-2026-31818
Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist
CVSS Score
9.6
EPSS Score
0.0%
EPSS Percentile
0th
Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.
| CWE | CWE-918 CWE-1188 |
| Vendor | budibase |
| Product | budibase |
| Published | Apr 3, 2026 |
| Last Updated | Apr 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for budibase budibase
Be the first to know when new critical vulnerabilities affecting budibase budibase are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
Budibase / budibase
< 3.33.4
References
github.com: https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45 github.com: https://github.com/Budibase/budibase/pull/18236 github.com: https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732 github.com: https://github.com/Budibase/budibase/releases/tag/3.33.4