๐Ÿ” CVE Alert

CVE-2026-47107

HIGH 8.1

Windmill < 1.703.2 Incorrect Default Permissions in nsjail Configuration

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Windmill prior to 1.703.2 contains an incorrect default permissions vulnerability in nsjail sandbox configuration files where /etc is bind-mounted without read-write restrictions, allowing authenticated users to write arbitrary entries to /etc/hosts, /etc/resolv.conf, and /etc/ssl/certs/ca-certificates.crt from within script execution sandboxes. Attackers can exploit persistent poisoned entries across all subsequent script executions on the same worker pod to redirect hostnames, intercept DNS queries, perform transparent HTTPS man-in-the-middle attacks, and intercept WM_TOKEN JWTs to gain workspace-admin access to other users' workspaces.

CWE CWE-276
Vendor windmill-labs
Product windmill
Published May 19, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for windmill-labs windmill

Be the first to know when new high vulnerabilities affecting windmill-labs windmill are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

windmill-labs / windmill
0 < 1.703.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/windmill-labs/windmill/releases/tag/v1.703.2 github.com: https://github.com/windmill-labs/windmill/pull/9194 github.com: https://github.com/windmill-labs/windmill/commit/f8467f38c8a053117ce62f96684cfb15ef792f08 vulncheck.com: https://www.vulncheck.com/advisories/windmill-incorrect-default-permissions-in-nsjail-configuration

Credits

Shai Dvash