Budibase Path Traversal (CVE-2026-30240)
CVE-2026-30240
CVE-2026-30240: Authenticated builder in Budibase 3.31.5 & earlier uses path traversal to read arbitrary server files, dumping secrets. Upgrade to 3.31.6 instantly.
Patch now - CVE-2026-30240 is a critical arbitrary file read in Budibase 3.31.5 and earlier that lets an authenticated builder use a path traversal in the PWA ZIP processing endpoint to exfiltrate any server file, including environment variables with JWT keys and database secrets. Upgrade to version 3.31.6 and rotate all credentials immediately.
Overview
A critical security vulnerability has been discovered in the Budibase low-code platform. This flaw, tracked as CVE-2026-30240, allows authenticated users with builder privileges to read sensitive files directly from the server’s filesystem. This can lead to a complete compromise of the Budibase instance and all connected services.
Vulnerability Details
In Budibase versions 3.31.5 and earlier, a specific feature for processing Progressive Web App (PWA) ZIP files contains a path traversal weakness. The vulnerability exists in the /api/pwa/process-zip endpoint. When an authenticated user uploads a specially crafted ZIP file, the server unsafely processes a path specified within it, using an unsanitized path.join() operation. This allows the attacker to direct the server to read any file it has access to.
The most critical target is the /proc/1/environ file on Linux systems, which contains all environment variables for the main process. This typically includes highly sensitive secrets such as JWT signing keys, database connection strings, encryption keys, and API tokens for external services like S3. The server inadvertently uploads the contents of these read files to its configured object store (e.g., MinIO or Amazon S3), where the attacker can then retrieve them via a signed URL.
Impact
The impact of this vulnerability is severe. A single successful exploit can lead to:
- Full Secret Exfiltration: All platform secrets and credentials are exposed.
- Complete Platform Compromise: An attacker can use the stolen secrets to impersonate the application, access or corrupt databases, and decrypt sensitive data.
- Lateral Movement: Compromised database and API credentials can be used to attack other connected internal services.
This constitutes a critical breach of confidentiality and integrity. For organizations dealing with sensitive data, this could trigger regulatory reporting requirements. You can learn more about data breach implications in our breach reports section.
Remediation and Mitigation
Immediate action is required for all Budibase administrators.
- Patch Immediately: Upgrade Budibase to version 3.31.6 or later without delay. This version contains the necessary fix to properly sanitize file paths.
- Rotate All Secrets: If you suspect any instance may have been compromised, you must rotate all exposed credentials as a precaution. This includes:
- JWT secrets
- Database passwords
- Encryption keys
- Any API tokens stored in environment variables
- Audit Access: Review logs for the
/api/pwa/process-zipendpoint for any suspicious activity prior to patching. - Principle of Least Privilege: Regularly review and audit user accounts with “builder” or administrative privileges.
Stay informed about critical vulnerabilities like this by following our latest security news. Do not delay in applying this update, as the exploit is straightforward for any authenticated user with builder access.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to version 3.30.4, an unsafe `eval()` vulnerability in Budibase's view filtering implementation allows a...
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) make...
excel-mcp-server is a Model Context Protocol server for Excel file manipulation. A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or St...
The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can...
Other Budibase Budibase Vulnerabilities
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) make...
Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to version 3.30.4, an unsafe `eval()` vulnerability in Budibase's view filtering implementation allows a...