Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash automation step executes user-provided commands using execSync without proper sanitization or validation. User input is processed through processStringSync which allows template interpolation, potentially allowing arbitrary command execution. This issue has been patched in version 3.33.4. | |
| Title | Budibase: Command Injection in Bash Automation Step | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T16:45:28.857Z
Reserved: 2026-01-28T14:50:47.886Z
Link: CVE-2026-25044
Updated: 2026-04-03T16:45:24.137Z
Status : Received
Published: 2026-04-03T16:16:35.870
Modified: 2026-04-03T16:16:35.870
Link: CVE-2026-25044
No data.
OpenCVE Enrichment
No data.