CVE-2026-26964: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in windmill-labs windmill
CVE-2026-26964 is a low-severity vulnerability in windmill-labs' Windmill platform versions 1. 634. 6 and below that allows any authenticated workspace member, including non-admin users, to access Slack OAuth client secrets via the GET /api/w/{workspace}/workspaces/get_settings endpoint. These secrets should be restricted to workspace administrators only. The issue arises because the Slack OAuth client secret was stored as a plain value and not redacted properly for non-admin users, exposing sensitive information. This vulnerability does not allow modification or disruption of services but risks unauthorized disclosure of OAuth credentials. The flaw has been fixed in version 1. 635. 0. Exploitation requires authenticated access but no user interaction beyond that.
AI Analysis
Technical Summary
Windmill is an open-source developer platform used internally for managing code, APIs, background jobs, workflows, and user interfaces. In versions 1.634.6 and earlier, a security vulnerability (CVE-2026-26964) exists that allows any authenticated workspace member to retrieve Slack OAuth client secrets via the GET /api/w/{workspace}/workspaces/get_settings API endpoint. Normally, sensitive workspace settings such as OAuth client secrets should only be accessible to workspace administrators. However, due to a legacy implementation detail where the Slack OAuth client secret was stored as a plain value rather than using variable indirection, it was not included in the redaction logic applied to non-admin users. Consequently, non-admin users receive the full secret instead of a redacted placeholder. This exposure constitutes an information disclosure vulnerability categorized under CWE-200. The vulnerability does not permit unauthorized modification or denial of service but compromises confidentiality by leaking OAuth credentials that could be used to impersonate or access Slack integrations. The vulnerability requires the attacker to be an authenticated workspace member but does not require any additional user interaction. The issue was addressed and fixed in Windmill version 1.635.0 by properly redacting the Slack OAuth client secret for non-admin users. There are no known exploits in the wild at this time, and the CVSS v3.1 base score is 2.7, reflecting low severity due to limited impact and exploitation requirements.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of Slack OAuth client secrets to any authenticated workspace member who is not an administrator. This exposure could allow malicious insiders or compromised user accounts to misuse Slack OAuth credentials, potentially enabling unauthorized access to Slack APIs, impersonation of the workspace in Slack integrations, or unauthorized data access through Slack apps. While the vulnerability does not allow direct modification of Windmill settings or disruption of services, the leaked credentials could be leveraged in broader attack scenarios against Slack workspaces integrated with Windmill. Organizations relying on Windmill for internal development and automation workflows that integrate with Slack are at risk of credential leakage, which could lead to lateral movement or data exfiltration within their Slack environment. The impact is limited to organizations using vulnerable versions of Windmill and having Slack integrations configured. Since exploitation requires authenticated access, external attackers without credentials cannot exploit this vulnerability directly. However, the risk remains significant in environments with many users or where user accounts may be compromised.
Mitigation Recommendations
Organizations should upgrade Windmill to version 1.635.0 or later, where this vulnerability has been fixed by properly redacting Slack OAuth client secrets for non-admin users. Until upgrading, administrators should restrict workspace membership to trusted users only and monitor access logs for suspicious API calls to the /api/w/{workspace}/workspaces/get_settings endpoint. Additionally, rotating Slack OAuth client secrets after upgrading is recommended to invalidate any potentially exposed credentials. Implementing strict access controls and auditing on Slack integrations can help detect and prevent misuse of leaked credentials. Organizations should also review their internal policies regarding the sharing of sensitive configuration data and consider additional encryption or secret management solutions to protect OAuth credentials. Regular security assessments and user privilege reviews will reduce the risk of insider threats exploiting this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, India, Brazil
CVE-2026-26964: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in windmill-labs windmill
Description
CVE-2026-26964 is a low-severity vulnerability in windmill-labs' Windmill platform versions 1. 634. 6 and below that allows any authenticated workspace member, including non-admin users, to access Slack OAuth client secrets via the GET /api/w/{workspace}/workspaces/get_settings endpoint. These secrets should be restricted to workspace administrators only. The issue arises because the Slack OAuth client secret was stored as a plain value and not redacted properly for non-admin users, exposing sensitive information. This vulnerability does not allow modification or disruption of services but risks unauthorized disclosure of OAuth credentials. The flaw has been fixed in version 1. 635. 0. Exploitation requires authenticated access but no user interaction beyond that.
AI-Powered Analysis
Technical Analysis
Windmill is an open-source developer platform used internally for managing code, APIs, background jobs, workflows, and user interfaces. In versions 1.634.6 and earlier, a security vulnerability (CVE-2026-26964) exists that allows any authenticated workspace member to retrieve Slack OAuth client secrets via the GET /api/w/{workspace}/workspaces/get_settings API endpoint. Normally, sensitive workspace settings such as OAuth client secrets should only be accessible to workspace administrators. However, due to a legacy implementation detail where the Slack OAuth client secret was stored as a plain value rather than using variable indirection, it was not included in the redaction logic applied to non-admin users. Consequently, non-admin users receive the full secret instead of a redacted placeholder. This exposure constitutes an information disclosure vulnerability categorized under CWE-200. The vulnerability does not permit unauthorized modification or denial of service but compromises confidentiality by leaking OAuth credentials that could be used to impersonate or access Slack integrations. The vulnerability requires the attacker to be an authenticated workspace member but does not require any additional user interaction. The issue was addressed and fixed in Windmill version 1.635.0 by properly redacting the Slack OAuth client secret for non-admin users. There are no known exploits in the wild at this time, and the CVSS v3.1 base score is 2.7, reflecting low severity due to limited impact and exploitation requirements.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of Slack OAuth client secrets to any authenticated workspace member who is not an administrator. This exposure could allow malicious insiders or compromised user accounts to misuse Slack OAuth credentials, potentially enabling unauthorized access to Slack APIs, impersonation of the workspace in Slack integrations, or unauthorized data access through Slack apps. While the vulnerability does not allow direct modification of Windmill settings or disruption of services, the leaked credentials could be leveraged in broader attack scenarios against Slack workspaces integrated with Windmill. Organizations relying on Windmill for internal development and automation workflows that integrate with Slack are at risk of credential leakage, which could lead to lateral movement or data exfiltration within their Slack environment. The impact is limited to organizations using vulnerable versions of Windmill and having Slack integrations configured. Since exploitation requires authenticated access, external attackers without credentials cannot exploit this vulnerability directly. However, the risk remains significant in environments with many users or where user accounts may be compromised.
Mitigation Recommendations
Organizations should upgrade Windmill to version 1.635.0 or later, where this vulnerability has been fixed by properly redacting Slack OAuth client secrets for non-admin users. Until upgrading, administrators should restrict workspace membership to trusted users only and monitor access logs for suspicious API calls to the /api/w/{workspace}/workspaces/get_settings endpoint. Additionally, rotating Slack OAuth client secrets after upgrading is recommended to invalidate any potentially exposed credentials. Implementing strict access controls and auditing on Slack integrations can help detect and prevent misuse of leaked credentials. Organizations should also review their internal policies regarding the sharing of sensitive configuration data and consider additional encryption or secret management solutions to protect OAuth credentials. Regular security assessments and user privilege reviews will reduce the risk of insider threats exploiting this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.612Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6997a804d7880ec89b3e50e0
Added to database: 2/20/2026, 12:17:08 AM
Last enriched: 2/20/2026, 12:31:22 AM
Last updated: 2/20/2026, 2:47:11 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2820: SQL Injection in Fujian Smart Integrated Management Platform System
MediumCVE-2026-2819: Missing Authorization in Dromara RuoYi-Vue-Plus
MediumCVE-2026-26065: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
CriticalCVE-2026-26064: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
CriticalCVE-2026-26980: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TryGhost Ghost
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.