CVE-2026-29059
Received Received - Intake
Path Traversal in Windmill get_log_file Allows Arbitrary File Read

Publication date: 2026-03-06

Last updated on: 2026-04-14

Assigner: GitHub, Inc.

Description
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})". The filename parameter is concatenated into a file path without sanitization, allowing an attacker to read arbitrary files on the server using ../ sequences. This issue has been patched in version 1.603.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
windmill windmill to 1.603.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-29059 is a high-severity vulnerability in Windmill versions prior to 1.603.3. It is an unauthenticated path traversal flaw in the get_log_file API endpoint, where the filename parameter is not sanitized and directly concatenated into a file path. This allows an attacker to use "../" sequences to read arbitrary files on the server.'}, {'type': 'paragraph', 'content': 'The most critical risk is exposure of the SUPERADMIN_SECRET environment variable, which acts as a Bearer token granting superadmin authentication and enables arbitrary code execution through the job preview API. However, this secret is rarely configured by default and mainly used in embedded Windmill instances, such as those embedded within Nextcloud Flow.'}, {'type': 'paragraph', 'content': 'In Nextcloud Flow deployments, admin credentials are also stored in a predictable configuration file, which can be accessed via this vulnerability, potentially leading to full system compromise.'}, {'type': 'paragraph', 'content': 'For standalone Windmill instances without SUPERADMIN_SECRET configured, the vulnerability is limited to arbitrary file reading. The issue was fixed in version 1.603.3 by sanitizing the filename parameter to prevent directory traversal.'}] [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to read arbitrary files on the server without authentication.

If the SUPERADMIN_SECRET environment variable is set, an attacker can gain superadmin authentication, enabling arbitrary code execution and full control over the system.

In deployments like Nextcloud Flow where Windmill is embedded, attackers can also access admin credentials stored in predictable configuration files, leading to full system compromise.

For standalone Windmill instances without SUPERADMIN_SECRET configured, the impact is limited to unauthorized file disclosure.

Users of Windmill Cloud and enterprise instances have been updated to the patched version, but self-hosted users are strongly advised to upgrade to version 1.603.3 or later to mitigate these risks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to access the vulnerable API endpoint with path traversal sequences in the filename parameter to see if arbitrary files can be read without authentication.'}, {'type': 'paragraph', 'content': 'For example, you can use curl commands to test the endpoint for directory traversal:'}, {'type': 'list_item', 'content': 'curl -v "http://<windmill-server>/api/w/<workspace>/jobs_u/get_log_file/../../../../etc/passwd"'}, {'type': 'list_item', 'content': 'curl -v "http://<windmill-server>/api/w/<workspace>/jobs_u/get_log_file/../proc/1/environ"'}, {'type': 'paragraph', 'content': 'If these commands return file contents such as /etc/passwd or environment variables, the system is vulnerable.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Windmill to version 1.603.3 or later, where the vulnerability has been patched by sanitizing the filename parameter to prevent directory traversal.

For self-hosted instances, applying this update is strongly advised.

Additionally, if using Windmill embedded within Nextcloud Flow, it is recommended to transition to the new native trigger integration to decouple Windmill and allow independent updates.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart