CVE-2026-31818 PUBLISHED

Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist

Assigner: GitHub_M
Reserved: 09.03.2026 Published: 03.04.2026 Updated: 03.04.2026

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSS Score: 9.6

Product Status

Vendor Budibase
Product budibase
Versions
  • Version < 3.33.4 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE
  • CWE-1188: Insecure Default Initialization of Resource CWE