๐Ÿ” CVE Alert

CVE-2026-35218

HIGH 8.7

Budibase: Stored XSS via unsanitized entity names rendered with {@html} in Builder Command Palette

CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
0th

Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. <img src=x onerror=alert(document.domain)>). When any Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the payload executes in their browser, stealing their session cookie and enabling full account takeover. This issue has been patched in version 3.32.5.

CWE CWE-79
Vendor budibase
Product budibase
Published Apr 3, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for budibase budibase

Be the first to know when new high vulnerabilities affecting budibase budibase are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Budibase / budibase
< 3.32.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Budibase/budibase/security/advisories/GHSA-gp5x-2v54-v2q5 github.com: https://github.com/Budibase/budibase/pull/18243 github.com: https://github.com/Budibase/budibase/commit/c9ccf0c19e5849f1bda96401aa33f97c99cd8cd6 github.com: https://github.com/Budibase/budibase/releases/tag/3.32.5