<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windmill (&lt; 1.703.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windmill--1.703.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 18:18:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windmill--1.703.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windmill nsjail Sandbox Incorrect Permissions Vulnerability (CVE-2026-47107)</title><link>https://feed.craftedsignal.io/briefs/2026-05-windmill-nsjail-perms/</link><pubDate>Tue, 19 May 2026 18:18:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-windmill-nsjail-perms/</guid><description>Windmill versions prior to 1.703.2 are vulnerable to incorrect default permissions in the nsjail sandbox configuration, allowing authenticated users to inject malicious entries into critical system files, leading to potential privilege escalation and man-in-the-middle attacks.</description><content:encoded><![CDATA[<p>Windmill, a low-code internal tool platform, is susceptible to a critical vulnerability (CVE-2026-47107) due to insecure default permissions within its nsjail sandbox configuration. Specifically, the /etc directory is bind-mounted without adequate read-write restrictions. This flaw permits authenticated users to manipulate essential system files such as /etc/hosts, /etc/resolv.conf, and /etc/ssl/certs/ca-certificates.crt from within script execution sandboxes. The vulnerability exists in versions prior to 1.703.2. Successful exploitation allows attackers to poison entries persistently across all subsequent script executions on the compromised worker pod. This can lead to the redirection of hostnames, interception of DNS queries, execution of transparent HTTPS man-in-the-middle attacks, and interception of WM_TOKEN JWTs. This can allow attackers to gain workspace-admin access to victim workspaces across tenants.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user gains access to the Windmill platform.</li>
<li>The user executes a malicious script within a nsjail sandbox.</li>
<li>The script leverages the lack of write restrictions on the /etc directory.</li>
<li>The script writes malicious entries to /etc/hosts to redirect hostnames.</li>
<li>Alternatively, the script writes malicious entries to /etc/resolv.conf to intercept DNS queries.</li>
<li>The script could also modify /etc/ssl/certs/ca-certificates.crt to perform HTTPS man-in-the-middle attacks.</li>
<li>The attacker intercepts WM_TOKEN JWTs used for authentication.</li>
<li>The attacker uses the stolen JWTs to gain workspace-admin access, escalating privileges and potentially compromising data across tenants.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-47107) could lead to significant compromise of the Windmill platform. Attackers can persistently redirect hostnames, intercept DNS queries, perform HTTPS man-in-the-middle attacks, and escalate privileges to gain workspace-admin access. The CVSS v3.1 base score for this vulnerability is 9.6, highlighting the severity. The poisoning of shared worker pods can impact multiple tenants.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Windmill to version 1.703.2 or later to remediate the vulnerability described in CVE-2026-47107.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Modification of /etc/hosts, /etc/resolv.conf, or /etc/ssl/certs/ca-certificates.crt in nsjail Sandbox</code> to identify potential exploitation attempts.</li>
<li>Monitor process creation events for scripts writing to sensitive files within nsjail environments, using the detection rule and tuning for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>man-in-the-middle</category><category>cve</category></item></channel></rss>