NIXPKGS-2026-0541
GitHub issue
published on 7 Mar 2026
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt accepted
- @mweinelt published on GitHub
Windmill: SUPERADMIN_SECRET (rarely used) can be accessed publicly
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})". The filename parameter is concatenated into a file path without sanitization, allowing an attacker to read arbitrary files on the server using ../ sequences. This issue has been patched in version 1.603.3.
References
-
https://github.com/windmill-labs/windmill/releases/tag/v1.603.3 x_refsource_MISC
Affected products
windmill
- ==< 1.603.3
Package maintainers
-
@happysalada Raphael Megzari <raphael@megzari.com>
-
@dit7ya Mostly Void <7rat13@gmail.com>