Description
Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenticated user with builder privileges to read arbitrary files from the server filesystem, including /proc/1/environ which contains all environment variables — JWT secrets, database credentials, encryption keys, and API tokens. The server reads attacker-specified files via unsanitized path.join() with user-controlled input from icons.json inside the uploaded ZIP, then uploads the file contents to the object store (MinIO/S3) where they can be retrieved through signed URLs. This results in complete platform compromise as all cryptographic secrets and service credentials are exfiltrated in a single request.
INFO
Published Date :
2026-03-09T20:50:09.129Z
Last Modified :
2026-03-10T15:22:48.070Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-30240 vulnerability.
| Vendors | Products |
|---|---|
| Budibase |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-30240.