CVE-2026-26964: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in windmill-labs windmill
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Versions 1.634.6 and below allow non-admin users to obtain Slack OAuth client secrets, which should only be accessible to workspace administrators. The GET /api/w/{workspace}/workspaces/get_settings endpoint returns the slack_oauth_client_secret to any authenticated workspace member, regardless of their admin status. It is expected behavior for non-admin users see a redacted version of workspace settings, as some of them are necessary for the frontend to behave correctly even for non-admins. However, the Slack configuration should not be visible to non-admins. This is a legacy issue where the setting was stored as a plain value instead of using $variable indirection, and it was never added to the redaction logic. This issue has been fixed in version 1.635.0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-26964 affects windmill, an open-source developer platform used for managing internal code, APIs, background jobs, workflows, and user interfaces. In versions 1.634.6 and earlier, the platform improperly exposes the Slack OAuth client secret to any authenticated workspace member, regardless of their administrative privileges. Specifically, the GET /api/w/{workspace}/workspaces/get_settings endpoint returns the slack_oauth_client_secret in plaintext, which should be restricted to workspace administrators only. This flaw stems from a legacy design where the Slack OAuth client secret was stored as a plain value rather than using variable indirection ($variable), and it was never included in the redaction logic that limits sensitive information visibility for non-admin users. While non-admin users are expected to see a redacted subset of workspace settings necessary for frontend functionality, the Slack OAuth secret should not be among them. This exposure risks unauthorized access to OAuth credentials, potentially enabling attackers to impersonate the application in Slack integrations or access Slack workspace data. The vulnerability does not require user interaction and requires only authenticated access with non-admin privileges. The issue was resolved in windmill version 1.635.0 by implementing proper redaction of the Slack OAuth client secret for non-admin users. There are no known exploits in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of Slack OAuth client secrets to any authenticated non-admin user within a windmill workspace. This exposure compromises the confidentiality of sensitive credentials that are intended to be restricted to administrators. With access to the Slack OAuth client secret, an attacker could potentially impersonate the windmill application in Slack integrations, leading to unauthorized access to Slack workspace resources, data leakage, or manipulation of Slack-based workflows and notifications. Although the vulnerability does not affect system integrity or availability, the compromise of OAuth credentials can facilitate further attacks on the Slack workspace or connected systems. Organizations relying on windmill for internal development and automation, especially those integrating with Slack, face increased risk of credential theft and subsequent lateral movement or data exfiltration within their collaboration environment. The vulnerability affects all organizations using windmill versions prior to 1.635.0 that have Slack integrations enabled and allow multiple authenticated users with non-admin roles. Since exploitation requires only authenticated access, insider threats or compromised user accounts could leverage this flaw to escalate access to sensitive OAuth credentials.
Mitigation Recommendations
Organizations should upgrade windmill to version 1.635.0 or later, where the vulnerability has been fixed by proper redaction of the Slack OAuth client secret for non-admin users. Until the upgrade can be applied, administrators should consider restricting the number of users with authenticated access to windmill workspaces, especially limiting non-admin users who do not require access to Slack integrations. Review and rotate Slack OAuth client secrets to invalidate any potentially exposed credentials. Implement monitoring and alerting for unusual OAuth token usage or Slack integration activity that could indicate misuse. Additionally, enforce strong authentication and access controls on windmill to reduce the risk of compromised user accounts. Evaluate the necessity of Slack integration within windmill and disable it if not required. Finally, audit workspace settings and logs regularly to detect unauthorized access attempts or suspicious behavior related to OAuth credentials.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-26964: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in windmill-labs windmill
Description
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Versions 1.634.6 and below allow non-admin users to obtain Slack OAuth client secrets, which should only be accessible to workspace administrators. The GET /api/w/{workspace}/workspaces/get_settings endpoint returns the slack_oauth_client_secret to any authenticated workspace member, regardless of their admin status. It is expected behavior for non-admin users see a redacted version of workspace settings, as some of them are necessary for the frontend to behave correctly even for non-admins. However, the Slack configuration should not be visible to non-admins. This is a legacy issue where the setting was stored as a plain value instead of using $variable indirection, and it was never added to the redaction logic. This issue has been fixed in version 1.635.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-26964 affects windmill, an open-source developer platform used for managing internal code, APIs, background jobs, workflows, and user interfaces. In versions 1.634.6 and earlier, the platform improperly exposes the Slack OAuth client secret to any authenticated workspace member, regardless of their administrative privileges. Specifically, the GET /api/w/{workspace}/workspaces/get_settings endpoint returns the slack_oauth_client_secret in plaintext, which should be restricted to workspace administrators only. This flaw stems from a legacy design where the Slack OAuth client secret was stored as a plain value rather than using variable indirection ($variable), and it was never included in the redaction logic that limits sensitive information visibility for non-admin users. While non-admin users are expected to see a redacted subset of workspace settings necessary for frontend functionality, the Slack OAuth secret should not be among them. This exposure risks unauthorized access to OAuth credentials, potentially enabling attackers to impersonate the application in Slack integrations or access Slack workspace data. The vulnerability does not require user interaction and requires only authenticated access with non-admin privileges. The issue was resolved in windmill version 1.635.0 by implementing proper redaction of the Slack OAuth client secret for non-admin users. There are no known exploits in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of Slack OAuth client secrets to any authenticated non-admin user within a windmill workspace. This exposure compromises the confidentiality of sensitive credentials that are intended to be restricted to administrators. With access to the Slack OAuth client secret, an attacker could potentially impersonate the windmill application in Slack integrations, leading to unauthorized access to Slack workspace resources, data leakage, or manipulation of Slack-based workflows and notifications. Although the vulnerability does not affect system integrity or availability, the compromise of OAuth credentials can facilitate further attacks on the Slack workspace or connected systems. Organizations relying on windmill for internal development and automation, especially those integrating with Slack, face increased risk of credential theft and subsequent lateral movement or data exfiltration within their collaboration environment. The vulnerability affects all organizations using windmill versions prior to 1.635.0 that have Slack integrations enabled and allow multiple authenticated users with non-admin roles. Since exploitation requires only authenticated access, insider threats or compromised user accounts could leverage this flaw to escalate access to sensitive OAuth credentials.
Mitigation Recommendations
Organizations should upgrade windmill to version 1.635.0 or later, where the vulnerability has been fixed by proper redaction of the Slack OAuth client secret for non-admin users. Until the upgrade can be applied, administrators should consider restricting the number of users with authenticated access to windmill workspaces, especially limiting non-admin users who do not require access to Slack integrations. Review and rotate Slack OAuth client secrets to invalidate any potentially exposed credentials. Implement monitoring and alerting for unusual OAuth token usage or Slack integration activity that could indicate misuse. Additionally, enforce strong authentication and access controls on windmill to reduce the risk of compromised user accounts. Evaluate the necessity of Slack integration within windmill and disable it if not required. Finally, audit workspace settings and logs regularly to detect unauthorized access attempts or suspicious behavior related to OAuth credentials.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.612Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6997a804d7880ec89b3e50e0
Added to database: 2/20/2026, 12:17:08 AM
Last enriched: 2/28/2026, 2:49:20 PM
Last updated: 4/4/2026, 8:16:10 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.