Critical severity9.1NVD Advisory· Published Apr 24, 2026· Updated Apr 28, 2026
CVE-2026-41428
CVE-2026-41428
Description
Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a query parameter. For example, POST /api/global/users/search?x=/api/system/status bypasses all authentication because the regex /api/system/status/ matches in the query string portion of the URL. This vulnerability is fixed in 3.35.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@budibase/backend-corenpm | <= 3.35.3 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggfnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-8783-3wgf-jggfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41428ghsaADVISORY
News mentions
0No linked articles in our index yet.