TROYANOSYVIRUS
Back to CVEs

CVE-2026-33226

HIGH
8.7

Description

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) makes server-side HTTP requests to any URL supplied by the user in fields.path with no validation. An authenticated admin can reach internal services that are not exposed to the internet — including cloud metadata endpoints (AWS/GCP/Azure), internal databases, Kubernetes APIs, and other pods on the internal network. On GCP this leads to OAuth2 token theft with cloud-platform scope (full GCP access). On any deployment it enables full internal network enumeration. At time of publication, there are no publicly available patches.

CVE Details

CVSS v3.1 Score8.7
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published3/20/2026
Last Modified3/23/2026
Sourcenvd
Honeypot Sightings0

Affected Products

budibase:budibase

Weaknesses (CWE)

CWE-918

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.