Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4f9j-vr4p-642r | Budibase auth session cookies are set with httpOnly:false — any XSS can lead to full account takeover |
Thu, 07 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Budibase
Budibase budibase |
|
| Vendors & Products |
Budibase
Budibase budibase |
Thu, 07 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Budibase is an open-source low-code platform. Prior to version 3.35.10, the budibase:auth cookie containing the JWT session token is set with httpOnly: false at packages/backend-core/src/utils/utils.ts:218. JavaScript can read this cookie via document.cookie. This means every XSS becomes a full account takeover — the attacker steals the JWT and has persistent access to the victim's account. The cookie also lacks secure: true (sent over plaintext HTTP) and sameSite attribute. This issue has been patched in version 3.35.10. | |
| Title | Budibase auth session cookies are set with httpOnly:false — any XSS can lead to full account takeover | |
| Weaknesses | CWE-1004 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T19:39:45.605Z
Reserved: 2026-04-25T05:37:12.118Z
Link: CVE-2026-42239
Updated: 2026-05-07T19:39:41.873Z
Status : Awaiting Analysis
Published: 2026-05-07T20:16:44.097
Modified: 2026-05-07T20:35:58.117
Link: CVE-2026-42239
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:15:11Z
Github GHSA