JustAppSec
Back to news

Budibase webhook query-string pattern bypasses auth middleware on all server-side APIs (CVE-2026-31816)

What happened

A critical vulnerability in Budibase allows an unauthenticated remote attacker to bypass the server's authorized() middleware by appending a webhook path pattern to the query string of requests (for example, using ?/webhooks/trigger). The issue is caused by isWebhookEndpoint() testing an unanchored regex against ctx.request.url (Koa), which includes query parameters. When it matches, the middleware returns next() early, skipping authentication/authorization and CSRF protection.

Who is impacted

  • Budibase deployments running versions <= 3.31.4.
  • Impact described in the CVE record includes complete authentication bypass and broad API access (CRUD over tables/rows/automations/datasources, plus CSRF bypass).
  • CVSS v3.1 base score: 9.1 (Critical).

What to do now

  • Determine whether you are running Budibase <= 3.31.4.
  • Until an upstream fix is available, treat Budibase server-side APIs as potentially unauthenticated and reduce exposure (e.g., restrict network access to trusted users/VPN, tighten ingress rules, and consider blocking requests whose query strings contain webhook path patterns like ?/webhooks/ at a reverse proxy).
  • Review access logs for unexpected requests to /api/* endpoints containing webhook-like query-string fragments.

Additional Information

  • GitHub Security Advisory referenced by the CVE: https://github.com/Budibase/budibase/security/advisories/GHSA-gw94-hprh-4wj8.
Source: CVE Project (cvelistV5)
Published 09 Mar 2026Updated 09 Mar 2026

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.