CVE-2026-23696: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Windmill Labs Windmill CE (Community Edition)
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.
AI Analysis
Technical Summary
CVE-2026-23696 is an SQL injection vulnerability (CWE-89) affecting Windmill Labs Windmill CE (Community Edition) versions 1.276.0 through 1.603.2. The flaw exists in the folder ownership management functionality, where the owner parameter is not properly sanitized, allowing authenticated attackers to inject malicious SQL commands. Exploitation can lead to disclosure of sensitive information including JWT signing secrets and administrative user identifiers, enabling token forgery and arbitrary code execution via workflow execution endpoints. The vulnerability is rated critical with a CVSS 4.0 score of 9.4, indicating high impact and ease of exploitation given low attack complexity and no user interaction required.
Potential Impact
The vulnerability allows authenticated attackers to perform SQL injection, leading to unauthorized disclosure of sensitive data such as JWT signing secrets and administrative user identifiers. This enables attackers to forge administrative tokens and execute arbitrary code within the application context, potentially compromising the entire system. The critical CVSS score reflects the severe impact on confidentiality, integrity, and availability.
Mitigation Recommendations
No official patch or remediation guidance is currently available from Windmill Labs. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until a fix is released, restrict access to the affected functionality to trusted users only and monitor for suspicious activity related to folder ownership management. Avoid exposing the affected versions in untrusted environments.
CVE-2026-23696: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Windmill Labs Windmill CE (Community Edition)
Description
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-23696 is an SQL injection vulnerability (CWE-89) affecting Windmill Labs Windmill CE (Community Edition) versions 1.276.0 through 1.603.2. The flaw exists in the folder ownership management functionality, where the owner parameter is not properly sanitized, allowing authenticated attackers to inject malicious SQL commands. Exploitation can lead to disclosure of sensitive information including JWT signing secrets and administrative user identifiers, enabling token forgery and arbitrary code execution via workflow execution endpoints. The vulnerability is rated critical with a CVSS 4.0 score of 9.4, indicating high impact and ease of exploitation given low attack complexity and no user interaction required.
Potential Impact
The vulnerability allows authenticated attackers to perform SQL injection, leading to unauthorized disclosure of sensitive data such as JWT signing secrets and administrative user identifiers. This enables attackers to forge administrative tokens and execute arbitrary code within the application context, potentially compromising the entire system. The critical CVSS score reflects the severe impact on confidentiality, integrity, and availability.
Mitigation Recommendations
No official patch or remediation guidance is currently available from Windmill Labs. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until a fix is released, restrict access to the affected functionality to trusted users only and monitor for suspicious activity related to folder ownership management. Avoid exposing the affected versions in untrusted environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-14T22:02:15.209Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d53bdbaaed68159a38bdad
Added to database: 4/7/2026, 5:16:11 PM
Last enriched: 4/7/2026, 5:31:55 PM
Last updated: 4/8/2026, 2:01:55 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.