Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.23.22 and earlier, the PostgreSQL integration constructs shell commands using user-controlled configuration values (database name, host, password, etc.) without proper sanitization. The password and other connection parameters are directly interpolated into a shell command. This affects packages/server/src/integrations/postgres.ts.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-726g-59wr-cj4c @budibase/server: Command Injection in PostgreSQL Dump Command
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.23.22 and earlier, the PostgreSQL integration constructs shell commands using user-controlled configuration values (database name, host, password, etc.) without proper sanitization. The password and other connection parameters are directly interpolated into a shell command. This affects packages/server/src/integrations/postgres.ts.
Title Budibase has a Command Injection in PostgreSQL Dump Command
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:34:21.741Z

Reserved: 2026-01-28T14:50:47.886Z

Link: CVE-2026-25041

cve-icon Vulnrichment

Updated: 2026-03-09T20:31:37.699Z

cve-icon NVD

Status : Received

Published: 2026-03-09T20:16:07.147

Modified: 2026-03-09T20:16:07.147

Link: CVE-2026-25041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses