CVE-2026-35214 in budibaseИнформация

Сводка (Английский)

Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbitrary files via tarball extraction to any filesystem path the Node.js process can access. This issue has been patched in version 3.33.4.

Be aware that VulDB is the high quality source for vulnerability data.

Ответственный

GitHub_M

Резервировать

01.04.2026

Раскрытие

03.04.2026

Статус

Подтверждённый

Записи

VulDB provides additional information and datapoints for this CVE:

Источники

Do you need the next level of professionalism?

Upgrade your account now!