PT-2026-23658 · Windmill · Windmill
Chocapikk
·
Published
2026-03-06
·
Updated
2026-04-07
·
CVE-2026-29059
CVSS v4.0
6.9
Medium
| AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
Windmill versions prior to 1.603.3
Description
Windmill is a developer platform for internal code, including APIs, background jobs, workflows, and UIs. A path traversal vulnerability exists in the
get log file API endpoint ('/api/w/{workspace}/jobs u/get log file/{filename}') prior to version 1.603.3. The filename parameter is improperly concatenated into a file path without sufficient sanitization. This allows an attacker to read arbitrary files on the server by utilizing '../' sequences. Exploitation does not require authentication. The vulnerability allows access to sensitive information, including potential credential leaks and root shell access.Recommendations
Update Windmill to version 1.603.3 or later.
Exploit
Fix
RCE
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windmill