HomeBudibaseCVE-2026-35218

CVE-2026-35218

HIGH
8.7CVSS
Published: 2026-04-03
Updated: 2026-04-08
AI Analysis

Description

Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. <img src=x onerror=alert(document.domain)>). When any Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the payload executes in their browser, stealing their session cookie and enabling full account takeover. This issue has been patched in version 3.32.5.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-79

Metadata

Primary Vendor
BUDIBASE
Published
4/3/2026
Last Modified
4/8/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

budibase : budibase

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-35218 | HIGH Severity | CVEDatabase.com | CVEDatabase.com