CVE-2026-25040

8.8 HIGH

📋 TL;DR

This vulnerability allows Creator-level users in Budibase to bypass UI restrictions and invite new users with any role (including Admin) via API manipulation. This leads to privilege escalation and potential complete workspace/organization takeover. All Budibase deployments up to version 3.26.3 are affected.

💻 Affected Systems

Products:
  • Budibase
Versions: Up to and including 3.26.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Budibase deployments with Creator users are vulnerable. The vulnerability exists in the API endpoint handling user invitations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Budibase workspace/organization with full administrative control, data exfiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized users gain elevated privileges, create backdoor admin accounts, and access sensitive internal tools and data.

🟢

If Mitigated

Limited impact if strict network segmentation, API monitoring, and least privilege principles are enforced.

🌐 Internet-Facing: HIGH - If Budibase instance is internet-accessible, attackers could exploit this remotely after obtaining Creator credentials.
🏢 Internal Only: HIGH - Insider threats or compromised Creator accounts can escalate privileges and compromise the entire platform.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Creator-level credentials but involves simple API request manipulation. Proof-of-concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available as of publication

Vendor Advisory: https://github.com/Budibase/budibase/security/advisories/GHSA-4wfw-r86x-qxrm

Restart Required: No

Instructions:

No official patch available. Monitor Budibase security advisories for updates and apply immediately when released.

🔧 Temporary Workarounds

Restrict API Access

all

Implement network controls to restrict access to Budibase API endpoints from unauthorized users/systems.

Monitor User Invitations

all

Implement logging and alerting for all user invitation activities, especially those creating Admin accounts.

🧯 If You Can't Patch

  • Temporarily disable user invitation functionality for Creator roles
  • Implement strict API rate limiting and anomaly detection for invitation endpoints

🔍 How to Verify

Check if Vulnerable:

Check Budibase version. If version is 3.26.3 or earlier, the system is vulnerable.

Check Version:

Check Budibase admin panel or deployment configuration for version information.

Verify Fix Applied:

When patch is available, verify version is higher than 3.26.3 and test that Creator users cannot invite users with elevated roles.

📡 Detection & Monitoring

Log Indicators:

  • API requests to user invitation endpoints from Creator accounts
  • User creation events with Admin/Creator roles
  • Multiple user invitations in short timeframes

Network Indicators:

  • Unusual API traffic patterns to /api/global/users/invite or similar endpoints
  • POST requests with role parameter manipulation

SIEM Query:

source="budibase" AND (event="user_invite" OR endpoint="/api/global/users/invite") AND (role="admin" OR role="creator")

🔗 References

📤 Share & Export