CVE-2026-35214 in budibase
Сводка (Английский)
Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbitrary files via tarball extraction to any filesystem path the Node.js process can access. This issue has been patched in version 3.33.4.
Be aware that VulDB is the high quality source for vulnerability data.
Ответственный
GitHub_M
Резервировать
01.04.2026
Раскрытие
03.04.2026
Статус
Подтверждённый
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 355181 | budibase Plugin File Upload upload createTempFolder обход каталога | 22 | Не определено | Официальное исправление | CVE-2026-35214 |