Budibase CVE-2026-31818: Brief Summary of a Critical SSRF via Insecure Default Configuration

A short review of CVE-2026-31818, a critical SSRF vulnerability in Budibase's REST datasource connector caused by an unset IP blacklist environment variable, scoring 9.6 CVSS and affecting all versions prior to 3.33.4.

CVE Analysis

6 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-03

Budibase CVE-2026-31818: Brief Summary of a Critical SSRF via Insecure Default Configuration
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A default configuration oversight in Budibase's REST datasource connector left every standard deployment wide open to server side request forgery, earning a CVSS score of 9.6. The IP blacklist meant to prevent outbound requests to internal services simply never activated because the controlling environment variable was never set in any official deployment template.

Budibase is an open source low code platform designed to help engineers build forms, portals, and approval apps. Founded in Belfast in 2019 and backed by $9.25 million in seed funding, the platform allows users to connect to external data sources including Postgres, MySQL, and REST APIs. Its positioning in the low code space means it is frequently deployed in enterprise environments where it has direct network access to internal services and databases.

Technical Information

CVE-2026-31818 maps to two CWE classifications: CWE-918 (Server Side Request Forgery) and CWE-1188 (Insecure Default Initialization of Resource). The interplay between these two weaknesses is what makes this vulnerability both critical and trivially exploitable.

The Blacklist Mechanism and Its Failure

Budibase's REST data source feature allows users to configure connections to external APIs through the platform's Workspace Settings under Connections to APIs. To mitigate SSRF risk, the platform implements an IP blacklist controlled by the BLACKLIST_IPS environment variable. According to Budibase's hosting settings documentation, this variable is intended to specify IP addresses, hostnames, or CIDR subnets that the outbound REST query integration is prevented from connecting to.

The fundamental problem: BLACKLIST_IPS is not set by default in any of the official deployment configurations. When this variable is empty or undefined, the blacklist function unconditionally returns false. This means every outbound request from the REST connector passes through without any IP validation whatsoever. The protection mechanism exists in code but is functionally inert across all default installations.

Attack Flow

Exploitation requires authenticated access to the Budibase platform with permissions to configure REST datasources. The attack proceeds as follows:

  1. An authenticated user navigates to Workspace Settings and configures a new REST datasource connection.
  2. The user points the REST endpoint at an internal target, such as http://169.254.169.254/latest/meta-data/ (AWS metadata service), http://127.0.0.1:6379/ (a local Redis instance), or any RFC1918 address hosting internal services.
  3. When the request is executed, Budibase's blacklist function evaluates the target IP against the loaded blacklist entries.
  4. Because BLACKLIST_IPS was never set, the blacklist is empty, and the function returns false (indicating the IP is not blacklisted).
  5. The request proceeds to the internal target, and the response is returned to the attacker through the Budibase interface.

No special tooling is required. The platform's own UI provides the complete attack surface.

Post Patch Behavior

Version 3.33.4 introduces a default blacklist that activates when BLACKLIST_IPS is not explicitly configured. The default blocked ranges are:

RangeDescription
127.0.0.0/8Loopback addresses
10.0.0.0/8RFC1918 private (Class A)
172.16.0.0/12RFC1918 private (Class B)
192.168.0.0/16RFC1918 private (Class C)
169.254.0.0/16Link local / cloud metadata
0.0.0.0/8Current network
::1/128IPv6 loopback
fc00::/7IPv6 unique local
fe80::/10IPv6 link local

For self hosted environments that legitimately need to reach internal APIs, the default blacklist is only disabled when both SELF_HOSTED is set to 1 and BLACKLIST_IPS is explicitly defined. Setting BLACKLIST_IPS to an empty value completely disables the blacklist and reintroduces the original vulnerability. Requests to internal services that resolve to blocked ranges will fail with a generic "Cannot connect to URL" error unless the override is properly configured.

Affected Systems and Versions

All versions of Budibase prior to 3.33.4 are affected. This includes every official deployment configuration (Docker, Kubernetes, and other supported methods) where the BLACKLIST_IPS environment variable was not manually set by the administrator. The vulnerability is present regardless of whether the deployment is cloud hosted or self hosted, as the default configuration ships without this variable in all cases.

The fix is available in version 3.33.4 and later. Budibase's security policy states that only the latest major version receives security patches, so no backports to older release lines should be expected.

Vendor Security History

Budibase maintains a responsible disclosure policy via huntr.dev and provides a dedicated security contact email. Their security policy, documented in the repository's SECURITY.md, explicitly states that only the latest major version will be patched for security vulnerabilities. This creates a practical challenge for organizations that cannot upgrade quickly.

The broader Budibase ecosystem has seen notable security research activity in early 2026. Other vulnerabilities including CVE-2026-33226 (another SSRF flaw) and CVE-2026-31816 have been documented in vulnerability databases and security bulletins during this period. The clustering of SSRF related findings suggests that the REST connector's security controls have been a focus area for researchers.

Updates to community curated templates for the nuclei scanning engine indicate that automated scanning for Budibase vulnerabilities is actively occurring, which increases the likelihood that unpatched instances will be discovered by both researchers and threat actors.

References

Detect & fix
what others miss

Security magnifying glass visualization