Description
Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. <img src=x onerror=alert(document.domain)>). When any Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the payload executes in their browser, stealing their session cookie and enabling full account takeover. This issue has been patched in version 3.32.5.
INFO
Published Date :
2026-04-03T15:47:45.469Z
Last Modified :
2026-04-03T20:05:06.999Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-35218 vulnerability.
| Vendors | Products |
|---|---|
| Budibase |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35218.