CVE-2026-33881 in windmill-labs windmillИнформация

Сводка (Английский)

Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Workspace environment variable values are interpolated into JavaScript string literals without escaping single quotes in the NativeTS executor. A workspace admin who sets a custom environment variable with a value containing `'` can inject arbitrary JavaScript that executes inside every NativeTS script in that workspace. This is a code injection bug in `worker.rs`, not related to the sandbox/NSJAIL topic. Version 1.664.0 patches the issue.

Ответственный

GitHub_M

Резервировать

24.03.2026

Раскрытие

27.03.2026

Записи

VulDB provides additional information and datapoints for this CVE:

Do you need the next level of professionalism?

Upgrade your account now!