Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2wfh-rcwf-wh23 | Budibase: Path traversal in plugin file upload enables arbitrary directory deletion and file write |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Budibase
Budibase budibase |
|
| Vendors & Products |
Budibase
Budibase budibase |
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbitrary files via tarball extraction to any filesystem path the Node.js process can access. This issue has been patched in version 3.33.4. | |
| Title | Budibase: Path traversal in plugin file upload enables arbitrary directory deletion and file write | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T16:04:36.168Z
Reserved: 2026-04-01T18:48:58.937Z
Link: CVE-2026-35214
Updated: 2026-04-03T16:04:29.253Z
Status : Received
Published: 2026-04-03T16:16:41.607
Modified: 2026-04-03T16:16:41.607
Link: CVE-2026-35214
No data.
OpenCVE Enrichment
Updated: 2026-04-03T21:15:13Z
Github GHSA