There is no workaround at this time for any budibase app that uses JS. You must fully migrate post version 2.20.0 to patch the vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @budibase/server | npm | < 2.20.0 | 2.20.0 |
The vulnerability stems directly from Budibase's use of vm2's VM2 class for code execution. The commit diff shows they replaced VM2 with IsolatedVM in script.ts. The advisory explicitly states vm2's sandbox escape vulnerability (GHSA-cchq-frgv-rjh5) allows accessing process.env. The execute method and constructor are vulnerable entry points because they directly interface with vm2's insecure sandbox implementation. The high confidence comes from: 1) explicit library replacement in patches, 2) CVE attribution, and 3) reproducible PoC showing environment variable leakage through these functions.
KEV Misses 88% of Exploited CVEs- Get the report