Report: CVE-2026-35218 - Budibase: Stored XSS via unsanitized entity names rendered with {@html} in Build
CVE ID :CVE-2026-35218 Published : April 3, 2026, 4:16 p.m. | 1 hour, 33 minutes ago Description :Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. ). When any Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the payload executes in their browser, stealing their session cookie and enabling full account takeover. This issue has been patched in version 3.32.5. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...