Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7r9j-r86q-7g45 | Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist |
Wed, 08 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:* |
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Budibase
Budibase budibase |
|
| Vendors & Products |
Budibase
Budibase budibase |
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4. | |
| Title | Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist | |
| Weaknesses | CWE-1188 CWE-918 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T20:04:33.012Z
Reserved: 2026-03-09T17:41:56.076Z
Link: CVE-2026-31818
Updated: 2026-04-03T20:04:28.809Z
Status : Analyzed
Published: 2026-04-03T16:16:39.800
Modified: 2026-04-08T21:19:30.370
Link: CVE-2026-31818
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:29:13Z
Github GHSA