You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A critical unsafe eval() vulnerability in Budibase's view filtering implementation allows any authenticated user (including free tier accounts) to execute arbitrary JavaScript code on the server. This vulnerability ONLY affects Budibase Cloud (SaaS) - self-hosted deployments use native CouchDB views and are not vulnerable. The vulnerability exists in packages/server/src/db/inMemoryView.ts where user-controlled view map functions are directly evaluated without sanitization.
The primary impact comes from what lives inside the pod's environment: the app-service pod runs with secrets baked into its environment variables, including INTERNAL_API_KEY, JWT_SECRET, CouchDB admin credentials, AWS keys, and more. Using the extracted CouchDB credentials, we verified direct database access, enumerated all tenant databases, and confirmed that user records (email addresses) are readable.
Details
Root Cause
File: packages/server/src/db/inMemoryView.ts:28
exportasyncfunctionrunView(view: DBView,calculation: string,group: boolean,data: Row[]){// ...letfn=(doc: Document,emit: any)=>emit(doc._id)// BUDI-7060 -> indirect eval call appears to cause issues in cloudeval("fn = "+view?.map?.replace("function (doc)","function (doc, emit)"))// UNSAFE EVAL// ...}
The view.map parameter comes directly from user input when creating table views with filters. The code constructs a string by concatenating "fn = " with the user-controlled map function and passes it to eval(), allowing arbitrary JavaScript execution in the Node.js server context.
Self-hosted deployments are not affected because they use native CouchDB design documents instead of the in-memory eval() path.
Attack Flow
Authenticated user creates a table view with custom filter
Frontend sends POST request to /api/views with malicious payload in filter value
Backend stores view configuration in CouchDB
When view is queried (GET /api/views/{viewName}), runView() is called
Malicious code is eval()'d on server - RCE achieved
Exploitation Vector
The vulnerability is triggered via the view filter mechanism. When creating a view with a filter condition, the filter value can be injected with JavaScript code that breaks out of the intended expression context:
Malicious filter value:
x" || (MALICIOUS_CODE_HERE, true) || "
This payload:
Closes the expected string context with x"
Uses || (OR operator) to inject arbitrary code
Returns true to make the filter always match
Closes with || "" to maintain valid syntax
Verified on Production
Tested on own Budibase Cloud account (y4ylfy7m.budibase.app,) to confirm severity. Testing was deliberately limited - no customer data was retained and exploitation was stopped once impact was confirmed:
Achieved RCE on app-service pod (hostname: app-service-5f4f6d796d-p6dhz, Kubernetes, eu-west-1)
Check webhook.site - you'll receive all server environment variables
Extracted data includes JWT_SECRET, INTERNAL_API_KEY, database credentials
Additional Note
The budibase:auth session cookie has Domain=.budibase.app (leading dot = all subdomains) and no HttpOnly flag, making it readable by JavaScript. Since the RCE allows uploading arbitrary HTML files to any subdomain (as demonstrated with the PoC artifact), an attacker could serve an XSS payload from their own tenant subdomain and steal session cookies from any Budibase Cloud user who visits that page (one click ATO).
Responsible Disclosure Statement
This vulnerability was discovered during independent security research. Testing was conducted on a personal free-tier account only. Exploitation was deliberately limited to what was necessary to confirm the vulnerability and its impact:
No customer data was accessed beyond enumerating database names and confirming that user records (email addresses) are readable
The PoC HTML file uploaded to confirm write access is benign
This report is being submitted directly to Budibase security with no plans for public disclosure until a fix is in place
Before any public disclosure, this report must be redacted/simplified - all credentials, hostnames, internal API keys, tenant IDs, and other sensitive platform details included here for Budibase's remediation purposes must be removed or redacted
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Learn more on MITRE.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Learn more on MITRE.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. eval).
Learn more on MITRE.
Summary
A critical unsafe
eval()vulnerability in Budibase's view filtering implementation allows any authenticated user (including free tier accounts) to execute arbitrary JavaScript code on the server. This vulnerability ONLY affects Budibase Cloud (SaaS) - self-hosted deployments use native CouchDB views and are not vulnerable. The vulnerability exists inpackages/server/src/db/inMemoryView.tswhere user-controlled view map functions are directly evaluated without sanitization.The primary impact comes from what lives inside the pod's environment: the
app-servicepod runs with secrets baked into its environment variables, includingINTERNAL_API_KEY,JWT_SECRET, CouchDB admin credentials, AWS keys, and more. Using the extracted CouchDB credentials, we verified direct database access, enumerated all tenant databases, and confirmed that user records (email addresses) are readable.Details
Root Cause
File:
packages/server/src/db/inMemoryView.ts:28Why Only Cloud is Vulnerable:
File:
packages/server/src/sdk/workspace/rows/search/internal/internal.ts:194-221The
view.mapparameter comes directly from user input when creating table views with filters. The code constructs a string by concatenating"fn = "with the user-controlled map function and passes it toeval(), allowing arbitrary JavaScript execution in the Node.js server context.Self-hosted deployments are not affected because they use native CouchDB design documents instead of the in-memory eval() path.
Attack Flow
/api/viewswith malicious payload in filter value/api/views/{viewName}),runView()is calledeval()'d on server - RCE achievedExploitation Vector
The vulnerability is triggered via the view filter mechanism. When creating a view with a filter condition, the filter value can be injected with JavaScript code that breaks out of the intended expression context:
Malicious filter value:
This payload:
x"||(OR operator) to inject arbitrary codetrueto make the filter always match|| ""to maintain valid syntaxVerified on Production
Tested on own Budibase Cloud account (y4ylfy7m.budibase.app,) to confirm severity. Testing was deliberately limited - no customer data was retained and exploitation was stopped once impact was confirmed:
app-servicepod (hostname:app-service-5f4f6d796d-p6dhz, Kubernetes,eu-west-1)process.env- confirmed presence of platform secrets (JWT_SECRET,INTERNAL_API_KEY,COUCH_DB_URL,MINIO_ACCESS_KEY, etc.)COUCH_DB_URLcredentials to verify CouchDB access - enumerated database list (489,827 databases) to confirm scale of impactProof of Concept
PoC Script
Video Demo
Screen.Recording.2026-02-21.at.7.31.24.AM.mov
Reproduction Steps
Prerequisites:
Exploitation:
budibase:auth)python3 budibase_rce_poc.pyVerification:
Additional Note
The
budibase:authsession cookie hasDomain=.budibase.app(leading dot = all subdomains) and noHttpOnlyflag, making it readable by JavaScript. Since the RCE allows uploading arbitrary HTML files to any subdomain (as demonstrated with the PoC artifact), an attacker could serve an XSS payload from their own tenant subdomain and steal session cookies from any Budibase Cloud user who visits that page (one click ATO).Responsible Disclosure Statement
This vulnerability was discovered during independent security research. Testing was conducted on a personal free-tier account only. Exploitation was deliberately limited to what was necessary to confirm the vulnerability and its impact: