Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-30240 β€” AI Deep Analysis Summary

CVSS 9.6 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Budibase PWA ZIP endpoint has a **Path Traversal** flaw. πŸ’₯ **Consequences**: Authenticated users can read **arbitrary server files**, leading to **full platform compromise**.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-22** (Path Traversal). The flaw lies in how the **PWA ZIP processing endpoint** handles file paths, allowing directory traversal sequences.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Budibase** (Low-code platform). Versions **3.31.5 and earlier** are vulnerable. Vendor: Budibase (UK).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hacker Capabilities**: Read **any file** on the server. πŸ’€ **Impact**: Complete platform takeover. Data exfiltration is guaranteed.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. Requires **Authentication** (PR:L). No user interaction needed (UI:N). Network accessible (AV:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Exploit Status**: No public PoC listed in data. However, the advisory is confirmed. Likely exploitable given the simple nature of CWE-22.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Budibase** instances running version **≀3.31.5**. Check for PWA ZIP endpoints in the attack surface.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update to a version **newer than 3.31.5**. Refer to the GitHub Security Advisory for the official patch details.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Restrict network access to the PWA ZIP endpoint. Enforce strict **WAF rules** to block `../` sequences in ZIP requests.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. CVSS **8.6** (High). Full system compromise risk. Patch immediately if running vulnerable versions.