CVE-2026-27702 - Vulnerability Analysis
CriticalCVSS: 9.9Last Updated: February 27, 2026
Budibase - Server-Side Code Execution
Overview
Budibase < 3.30.4 contains a server-side code execution vulnerability caused by unsafe eval() in view filtering implementation, letting authenticated users execute arbitrary JavaScript on Budibase Cloud servers, exploit requires authentication.
Severity & Score
Impact
Authenticated users can execute arbitrary code on the server, access secrets, and read sensitive tenant data, leading to full database compromise.
Mitigation
Update to version 3.30.4 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-27702 - Critical (9.9) Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to version 3.30.4, an unsafe `eval()` vulnerability in Budibase's view filtering implementation allows any authenticated user (including free tier acco... š https://www.thehackerwire.com/vulnerability/CVE-2026-27702/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-27702
- Severity
- Critical
- CVSS Score
- 9.9
- Type
- insecure_deserialization
- Status
- unconfirmed
- EPSS
- 6.7%
- Social Posts
- 1
CWE
- CWE-20
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L