Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-27702
Awaiting Analysis
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-25 Feb, 2026 | 16:23
Updated At-27 Feb, 2026 | 14:06

Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to version 3.30.4, an unsafe `eval()` vulnerability in Budibase's view filtering implementation allows any authenticated user (including free tier accounts) to execute arbitrary JavaScript code on the server. This vulnerability ONLY affects Budibase Cloud (SaaS) - self-hosted deployments use native CouchDB views and are not vulnerable. The vulnerability exists in `packages/server/src/db/inMemoryView.ts` where user-controlled view map functions are directly evaluated without sanitization. The primary impact comes from what lives inside the pod's environment: the `app-service` pod runs with secrets baked into its environment variables, including `INTERNAL_API_KEY`, `JWT_SECRET`, CouchDB admin credentials, AWS keys, and more. Using the extracted CouchDB credentials, we verified direct database access, enumerated all tenant databases, and confirmed that user records (email addresses) are readable. Version 3.30.4 contains a patch.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.9CRITICAL
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Type: Secondary
Version: 3.1
Base score: 9.9
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-20Primarysecurity-advisories@github.com
CWE-94Primarysecurity-advisories@github.com
CWE-95Primarysecurity-advisories@github.com
CWE ID: CWE-20
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-94
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-95
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/Budibase/budibase/commit/348659810cf930dda5f669e782706594c547115dsecurity-advisories@github.com
N/A
https://github.com/Budibase/budibase/pull/18087security-advisories@github.com
N/A
https://github.com/Budibase/budibase/releases/tag/3.30.4security-advisories@github.com
N/A
https://github.com/Budibase/budibase/security/advisories/GHSA-rvhr-26g4-p2r8security-advisories@github.com
N/A
Hyperlink: https://github.com/Budibase/budibase/commit/348659810cf930dda5f669e782706594c547115d
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/Budibase/budibase/pull/18087
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/Budibase/budibase/releases/tag/3.30.4
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/Budibase/budibase/security/advisories/GHSA-rvhr-26g4-p2r8
Source: security-advisories@github.com
Resource: N/A
Change History
0Changes found

Details not found