CVE-2026-23696
🟠 Łataj w tym tygodniu
Wstrzyknięcie SQL w Windmill umożliwia dostęp do wrażliwych danych i wykonanie kodu.
CVSS
9.9
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.
sql-injection
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.9 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-07 17:16:27 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 21:27:00 UTC |
Referencje
- https://apps.nextcloud.com/apps/flow/releases (disclosure@vulncheck.com)
- https://chocapikk.com/posts/2026/windfall-nextcloud-flow-windmill-rce/ (disclosure@vulncheck.com)
- https://github.com/Chocapikk/Windfall (disclosure@vulncheck.com)
- https://github.com/windmill-labs/windmill/commit/942fb629210ebb287f48467d1535ffde3a3eeafe (disclosure@vulncheck.com)
- https://github.com/windmill-labs/windmill/releases/tag/v1.603.3 (disclosure@vulncheck.com)
- https://www.vulncheck.com/advisories/windmill-file-ownership-handling-sqli-rce (disclosure@vulncheck.com)
- https://www.windmill.dev/ (disclosure@vulncheck.com)