CVE-2026-42239
Undergoing Analysis Undergoing Analysis - In Progress
Budibase Session Token Exposure via XSS

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: GitHub, Inc.

Description
Budibase is an open-source low-code platform. Prior to version 3.35.10, the budibase:auth cookie containing the JWT session token is set with httpOnly: false at packages/backend-core/src/utils/utils.ts:218. JavaScript can read this cookie via document.cookie. This means every XSS becomes a full account takeover β€” the attacker steals the JWT and has persistent access to the victim's account. The cookie also lacks secure: true (sent over plaintext HTTP) and sameSite attribute. This issue has been patched in version 3.35.10.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
budibase budibase 3.35.10
budibase backend_core to 3.35.10 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1004 The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-42239 is a vulnerability in Budibase's authentication cookie configuration prior to version 3.35.10. The `budibase:auth` cookie, which contains the JWT session token, was set with `httpOnly: false`, allowing JavaScript to access it via `document.cookie`. This means that if an attacker exploits any cross-site scripting (XSS) vulnerability, they can steal the JWT token and take over the victim's account persistently.

Additionally, the cookie lacked the `secure: true` flag, so it could be sent over unencrypted HTTP connections, and it also missed the `sameSite` attribute, making it vulnerable to cross-site request forgery (CSRF) attacks.

This vulnerability was fixed in Budibase version 3.35.10 by setting the cookie with `httpOnly: true`, `secure: true`, and `sameSite: 'lax'` attributes.


How can this vulnerability impact me? :

This vulnerability can lead to a full account takeover if an attacker exploits an XSS vulnerability to steal the JWT session token from the `budibase:auth` cookie.

Because the cookie is accessible via JavaScript and transmitted over unencrypted HTTP, attackers can gain persistent access to user accounts, compromising confidentiality and integrity.

Furthermore, the missing `sameSite` attribute exposes users to cross-site request forgery (CSRF) attacks, potentially allowing unauthorized actions on behalf of the user.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the budibase:auth cookie being set with httpOnly: false, allowing JavaScript access via document.cookie. To detect this on your system, you can inspect the cookies set by the Budibase application in your browser or via network traffic.

  • In a browser, open developer tools, go to the Application tab, and check the cookies for budibase:auth. Verify if the httpOnly flag is missing.
  • Use curl or similar tools to inspect the Set-Cookie header from the Budibase server responses, for example: curl -I http://your-budibase-instance | grep Set-Cookie
  • Check if the cookie lacks the secure and sameSite attributes by analyzing the Set-Cookie header.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to update Budibase to version 3.35.10 or later, where the vulnerability has been fixed.

If updating immediately is not possible, ensure that the budibase:auth cookie is configured with the following attributes:

  • httpOnly: true β€” to prevent JavaScript access to the cookie.
  • secure: true β€” to ensure the cookie is only sent over HTTPS.
  • sameSite: 'lax' β€” to reduce the risk of cross-site request forgery (CSRF) attacks.

Additionally, review and fix any existing cross-site scripting (XSS) vulnerabilities, as they can be exploited to steal the JWT token due to this cookie misconfiguration.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to steal JWT session tokens via JavaScript access to the authentication cookie, leading to full account takeover and persistent unauthorized access.

Such unauthorized access and potential data breaches could impact compliance with standards and regulations like GDPR and HIPAA, which require protection of user data confidentiality and integrity.

The lack of secure cookie attributes (httpOnly, secure, sameSite) increases the risk of session hijacking and cross-site request forgery, which are critical security controls under these regulations.

Therefore, until patched, this vulnerability could lead to non-compliance with these standards due to insufficient protection of authentication tokens and user sessions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart