<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windmill — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/windmill/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 17:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/windmill/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windmill Missing Authorization Vulnerability (CVE-2026-22683)</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-windmill-auth-bypass/</link><pubDate>Tue, 07 Apr 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-windmill-auth-bypass/</guid><description>Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability (CVE-2026-22683) that allows users with the Operator role to bypass intended restrictions and perform unauthorized entity creation and modification actions via the backend API, potentially leading to privilege escalation and remote code execution.</description><content:encoded><![CDATA[<p>Windmill, a low-code internal tool platform, contains a critical missing authorization vulnerability, tracked as CVE-2026-22683, affecting versions 1.56.0 through 1.614.0. The vulnerability stems from a failure to properly enforce role-based access controls within the backend API. Specifically, users assigned the &ldquo;Operator&rdquo; role, who are intended to have limited privileges and be restricted from creating or modifying entities, can bypass these restrictions.  This allows Operators to create and modify scripts, flows, apps, and raw_apps, effectively exceeding their intended permissions. Given that Operators can also execute scripts through the jobs API, this authorization bypass facilitates a direct path to privilege escalation and potentially remote code execution within the Windmill environment. Defenders should prioritize patching and detection efforts to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises or is assigned an &ldquo;Operator&rdquo; role within the Windmill platform.</li>
<li>The attacker authenticates to the Windmill backend API using their Operator credentials.</li>
<li>The attacker crafts a malicious API request to create a new script, flow, app, or raw_app, bypassing the intended authorization checks for Operator roles.</li>
<li>The Windmill API processes the request without properly validating the Operator&rsquo;s permissions, allowing the entity creation to proceed.</li>
<li>The attacker creates a script containing malicious code designed to escalate privileges or execute arbitrary commands.</li>
<li>The attacker utilizes the jobs API to execute the newly created malicious script.</li>
<li>The script executes with elevated privileges within the Windmill deployment environment.</li>
<li>The attacker achieves remote code execution, potentially compromising the entire Windmill instance and connected resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-22683 can lead to complete compromise of the Windmill instance. An attacker leveraging an Operator account can gain remote code execution capabilities. The missing authorization can lead to full control over the Windmill instance, potentially affecting all applications, flows, and scripts managed within the platform. Given the nature of Windmill as an internal tool platform, this could expose sensitive internal data and systems to unauthorized access. The number of affected organizations depends on the adoption rate of Windmill within the affected version range.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Windmill instances to a patched version beyond 1.614.0 to remediate CVE-2026-22683.</li>
<li>Implement the Sigma rule <code>Detect Windmill Unauthorized Entity Creation</code> to detect attempts to create scripts, flows, apps, or raw_apps from Operator accounts via the API.</li>
<li>Implement the Sigma rule <code>Detect Windmill Job Execution of Newly Created Entities</code> to detect the execution of scripts, flows, apps or raw_apps that were recently created.</li>
<li>Monitor Windmill API logs for suspicious activity related to entity creation and modification, focusing on requests originating from Operator accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>windmill</category><category>authorization-bypass</category><category>privilege-escalation</category><category>remote-code-execution</category></item><item><title>Windmill CE/EE SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-windmill-sqli/</link><pubDate>Tue, 07 Apr 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-windmill-sqli/</guid><description>Windmill CE/EE versions 1.276.0 through 1.603.2 are vulnerable to SQL injection in the folder ownership management, allowing authenticated attackers to inject SQL through the owner parameter, leading to sensitive data access, token forgery, and arbitrary code execution.</description><content:encoded><![CDATA[<p>Windmill CE and EE, versions 1.276.0 through 1.603.2, are susceptible to an SQL injection vulnerability (CVE-2026-23696) affecting the folder ownership management functionality. An authenticated attacker can exploit this flaw by injecting SQL code via the <code>owner</code> parameter. Successful exploitation allows the attacker to read sensitive information, including the JWT signing secret and administrative user identifiers. This access enables them to forge administrative tokens, ultimately leading to arbitrary code execution through the workflow execution endpoints. This vulnerability poses a significant risk to organizations using affected versions of Windmill, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Windmill CE/EE instance.</li>
<li>The attacker navigates to the folder ownership management section.</li>
<li>The attacker crafts a malicious HTTP request to modify folder ownership, injecting SQL code into the <code>owner</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The SQL injection allows the attacker to extract sensitive information from the database, such as the JWT signing secret and administrative user credentials.</li>
<li>The attacker uses the extracted JWT signing secret to forge an administrative token.</li>
<li>The attacker leverages the forged administrative token to authenticate to the workflow execution endpoint.</li>
<li>The attacker executes arbitrary code on the server via the workflow execution endpoint, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23696 can lead to complete compromise of the Windmill CE/EE instance. An attacker can gain unauthorized access to sensitive data, including credentials and internal application secrets. They can also execute arbitrary code on the server, potentially leading to data breaches, system downtime, and further lateral movement within the network. This vulnerability affects all organizations using Windmill CE/EE versions 1.276.0 through 1.603.2, and can result in significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Windmill CE/EE to version 1.603.3 or later to patch CVE-2026-23696 as per the vendor&rsquo;s release notes (<a href="https://github.com/windmill-labs/windmill/releases/tag/v1.603.3">https://github.com/windmill-labs/windmill/releases/tag/v1.603.3</a>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Windmill Folder Ownership Modification</code> to identify potential SQL injection attempts within HTTP requests to the folder ownership management endpoint.</li>
<li>Monitor web server logs for suspicious activity, such as SQL errors or unusual characters in the <code>owner</code> parameter of requests targeting the folder ownership management endpoint (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>rce</category><category>windmill</category></item></channel></rss>