← Volver a CVEs
CVE-2026-23696
CRITICAL9.9
Descripcion
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.
Detalles CVE
Puntuacion CVSS v3.19.9
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/7/2026
Ultima modificacion4/7/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-89
Referencias
https://apps.nextcloud.com/apps/flow/releases(disclosure@vulncheck.com)
https://chocapikk.com/posts/2026/windfall-nextcloud-flow-windmill-rce/(disclosure@vulncheck.com)
https://github.com/Chocapikk/Windfall(disclosure@vulncheck.com)
https://github.com/windmill-labs/windmill/commit/942fb629210ebb287f48467d1535ffde3a3eeafe(disclosure@vulncheck.com)
https://github.com/windmill-labs/windmill/releases/tag/v1.603.3(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/windmill-file-ownership-handling-sqli-rce(disclosure@vulncheck.com)
https://www.windmill.dev/(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.