{"api_version":"1","generated_at":"2026-04-24T02:24:40+00:00","cve":"CVE-2026-31818","urls":{"html":"https://cve.report/CVE-2026-31818","api":"https://cve.report/api/cve/CVE-2026-31818.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31818","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31818"},"summary":{"title":"Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist","description":"Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-03 16:16:39","updated_at":"2026-04-08 21:19:30"},"problem_types":["CWE-918","CWE-1188","CWE-918 CWE-918: Server-Side Request Forgery (SSRF)","CWE-1188 CWE-1188: Insecure Default Initialization of Resource"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"9.9","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"}},{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"9.6","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.6","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/Budibase/budibase/pull/18236","name":"https://github.com/Budibase/budibase/pull/18236","refsource":"security-advisories@github.com","tags":["Issue Tracking","Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732","name":"https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732","refsource":"security-advisories@github.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45","name":"https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45","refsource":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/Budibase/budibase/releases/tag/3.33.4","name":"https://github.com/Budibase/budibase/releases/tag/3.33.4","refsource":"security-advisories@github.com","tags":["Product","Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31818","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31818","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Budibase","product":"budibase","version":"affected < 3.33.4","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"31818","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"budibase","cpe5":"budibase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"31818","cve":"CVE-2026-31818","epss":"0.000120000","percentile":"0.016040000","score_date":"2026-04-13","updated_at":"2026-04-14 00:12:05"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-31818","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-03T20:04:22.287596Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-03T20:04:33.012Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"budibase","vendor":"Budibase","versions":[{"status":"affected","version":"< 3.33.4"}]}],"descriptions":[{"lang":"en","value":"Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"CWE-918: Server-Side Request Forgery (SSRF)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1188","description":"CWE-1188: Insecure Default Initialization of Resource","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-03T15:41:13.955Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Budibase/budibase/security/advisories/GHSA-7r9j-r86q-7g45"},{"name":"https://github.com/Budibase/budibase/pull/18236","tags":["x_refsource_MISC"],"url":"https://github.com/Budibase/budibase/pull/18236"},{"name":"https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732","tags":["x_refsource_MISC"],"url":"https://github.com/Budibase/budibase/commit/5b0fe83d4ece52696b62589cba89ef50cc009732"},{"name":"https://github.com/Budibase/budibase/releases/tag/3.33.4","tags":["x_refsource_MISC"],"url":"https://github.com/Budibase/budibase/releases/tag/3.33.4"}],"source":{"advisory":"GHSA-7r9j-r86q-7g45","discovery":"UNKNOWN"},"title":"Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-31818","datePublished":"2026-04-03T15:41:13.955Z","dateReserved":"2026-03-09T17:41:56.076Z","dateUpdated":"2026-04-03T20:04:33.012Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-03 16:16:39","lastModifiedDate":"2026-04-08 21:19:30","problem_types":["CWE-918","CWE-1188","CWE-918 CWE-918: Server-Side Request Forgery (SSRF)","CWE-1188 CWE-1188: Insecure Default Initialization of Resource"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:budibase:budibase:*:*:*:*:*:*:*:*","versionEndExcluding":"3.33.4","matchCriteriaId":"B316A29C-7C2F-4102-ACF6-DDB06B3D0AD5"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31818","Ordinal":"1","Title":"Budibase: Server-Side Request Forgery via REST Connector with Em","CVE":"CVE-2026-31818","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31818","Ordinal":"1","NoteData":"Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.","Type":"Description","Title":"Budibase: Server-Side Request Forgery via REST Connector with Em"}]}}}