Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-41428 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Budibase has an **Authorization Bypass** flaw. πŸ“‰ **Consequences**: Attackers can skip authentication entirely. They access protected internal apps/workflows as if they were public.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-287** (Improper Authentication). πŸ› **Flaw**: Middleware uses a **non-anchored regex** to match public endpoints. It fails to anchor the start/end of the URL string.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Budibase (UK-based low-code platform). πŸ“¦ **Affected**: Versions **before 3.35.4**. πŸ–₯️ **Component**: The authentication middleware handling `ctx.request.url`.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Bypass all login screens. πŸ“‚ **Data Access**: Read/Write internal apps, workflows, and admin panels. πŸš€ **Privileges**: Gain full control over internal business logic without valid credentials.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. πŸ“ **Auth**: Requires **NO** prior authentication (PR:N). 🎯 **Config**: Simple URL parameter injection. 🧠 **Skill**: Low complexity (AC:L). Any attacker can exploit this easily.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploit**: **No** specific PoC code provided in data. 🌐 **Status**: Advisory published (GHSA-8783-3wgf-jggf). ⚠️ **Risk**: Logic flaw is trivial to exploit manually via URL manipulation, even without a script.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for Budibase instances. πŸ§ͺ **Test**: Try appending public endpoint paths as query parameters to protected URLs.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: **Yes**, officially patched. πŸ“… **Patch Date**: 2026-04-24. πŸ”„ **Action**: Upgrade to **Budibase 3.35.4** or later immediately. The regex anchoring issue is resolved in the new version.

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch Workaround**: Hard to mitigate technically. 🧱 **Defense**: Use a **WAF** (Web Application Firewall) to block suspicious URL patterns. πŸ”’ **Network**: Restrict access to Budibase ports via firewall rules.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Patch **IMMEDIATELY**. βš–οΈ **Reason**: CVSS is high, no auth required, and it exposes internal business data. Do not wait. Update to v3.35.4 now.