Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as root inside the container. This issue has been patched in version 3.33.4. | |
| Title | Budibase: Unauthenticated Remote Code Execution via Webhook Trigger and Bash Automation Step | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T16:46:23.789Z
Reserved: 2026-04-01T18:48:58.938Z
Link: CVE-2026-35216
Updated: 2026-04-03T16:46:14.173Z
Status : Received
Published: 2026-04-03T16:16:41.800
Modified: 2026-04-03T17:16:53.273
Link: CVE-2026-35216
No data.
OpenCVE Enrichment
No data.