Budibase unsafe eval RCE (CVE-2026-27702)
CVE-2026-27702
Attackers can execute arbitrary code via unsafe eval in view filtering. Upgrade to Budibase 3.30.4 or later to fix.
Patch now - CVE-2026-27702 is a critical remote code execution vulnerability in Budibase Cloud prior to version 3.30.4 that grants authenticated attackers full server control and the ability to steal system secrets, including database admin credentials and internal API keys.
Overview
A critical security vulnerability in Budibase Cloud (SaaS) allows authenticated users to execute arbitrary code on the server. This flaw could lead to a complete compromise of the application environment and sensitive data.
Vulnerability Details
Budibase is a low-code platform for building internal tools. In versions prior to 3.30.4, a feature for filtering data views used an unsafe eval() function to process user input. This meant any authenticated user, including those on free accounts, could inject and run malicious JavaScript code directly on the Budibase server. The vulnerability is located in the file packages/server/src/db/inMemoryView.ts.
Important Note: This vulnerability only affects Budibase Cloud, the hosted Software-as-a-Service offering. Self-hosted Budibase deployments use a different technical approach and are not vulnerable.
Potential Impact
The impact of this vulnerability is severe. The compromised server pod contains critical environment variables with secrets like:
- Internal API keys
- JWT secrets for authentication
- Full CouchDB database administrator credentials
- AWS access keys
An attacker could use this code execution to steal these secrets. With the CouchDB credentials, they could directly access the backend database, enumerate all customer data, and exfiltrate sensitive information such as user email addresses and application data. This constitutes a full breach of the application’s security boundary.
Remediation and Mitigation
Immediate action is required for users of Budibase Cloud.
- Patch Immediately: The vendor has released a fix in Budibase version 3.30.4. Budibase Cloud has been patched by the vendor. If you are a Cloud customer, no action is needed on your part - the service has been updated.
- For Self-Hosted Users: If you operate a self-hosted Budibase instance, you are not affected by this specific vulnerability. However, always ensure you are running the latest stable version for other security and stability improvements.
- General Security Hygiene: As a best practice, organizations should review access logs for any unusual activity from the period before the patch was applied. Rotating internal secrets (like JWT_SECRET or API keys) is a recommended step after any potential security incident, though the patched code prevents new exploitation.
Summary
This critical vulnerability in Budibase Cloud allowed user-controlled code execution on the server, risking exposure of all system secrets and data. The SaaS platform has been patched to version 3.30.4. Self-hosted deployments were not vulnerable. Users should confirm their service is updated and consider proactive secret rotation as a precaution.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-27702?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) make...
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint...
PraisonAI is a multi-agent teams system. Prior to version 4.6.34, PraisonAI's MCP (Model Context Protocol) server (praisonai mcp serve) registers four file-handling tools by default — praisonai.rules....
Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SS...
Other Budibase Budibase Vulnerabilities
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) make...
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint...