Ad

CVE-2026-30240

CRITICAL CVSS 3.1: 8.1 EPSS 0.03%
Updated Mar 13, 2026
Budibase
Parameter Value
CVSS 8.1 (CRITICAL)
Affected Versions before 3.31.5
Type CWE-22 (Path Traversal), CWE-73 (External Control of File Name or Path)
Vendor Budibase
Public PoC No

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenticated user with builder privileges to read arbitrary files from the server filesystem, including /proc/1/environ which contains all environment variables — JWT secrets, database credentials, encryption keys, and API tokens. The server reads attacker-specified files via unsanitized path.join() with user-controlled input from icons.json inside the uploaded ZIP, then uploads the file contents to the object store (MinIO/S3) where they can be retrieved through signed URLs.

This results in complete platform compromise as all cryptographic secrets and service credentials are exfiltrated in a single request.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Budibase Budibase
cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*
<= 3.31.5