๐Ÿ” CVE Alert

CVE-2026-31818

CRITICAL 9.6

Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist

CVSS Score
9.6
EPSS Score
0.0%
EPSS Percentile
0th

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.

CWE CWE-918 CWE-1188
Vendor budibase
Product budibase
Published Apr 3, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for budibase budibase

Be the first to know when new critical vulnerabilities affecting budibase budibase are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Budibase / budibase
< 3.33.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45 github.com: https://github.com/Budibase/budibase/pull/18236 github.com: https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732 github.com: https://github.com/Budibase/budibase/releases/tag/3.33.4