LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-27702

CVE-2026-27702 - Vulnerability Analysis

CriticalCVSS: 9.9

Last Updated: February 27, 2026

Budibase - Server-Side Code Execution

Published: February 25, 2026Updated: February 27, 2026Remote Exploitable

Overview

Budibase < 3.30.4 contains a server-side code execution vulnerability caused by unsafe eval() in view filtering implementation, letting authenticated users execute arbitrary JavaScript on Budibase Cloud servers, exploit requires authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.9
EPSS Score: 6.7%(Probability of exploitation in next 30 days)

Impact

Authenticated users can execute arbitrary code on the server, access secrets, and read sensitive tenant data, leading to full database compromise.

Mitigation

Update to version 3.30.4 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

šŸ”“ CVE-2026-27702 - Critical (9.9) Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to version 3.30.4, an unsafe `eval()` vulnerability in Budibase's view filtering implementation allows any authenticated user (including free tier acco... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-27702/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-27702
Severity
Critical
CVSS Score
9.9
Type
insecure_deserialization
Status
unconfirmed
EPSS
6.7%
Social Posts
1

CWE

  • CWE-20

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

EPSS Score

6.7%Probability of exploitation in the next 30 days