Impact
Windmill’s API endpoint for workspace settings transparently returns the Slack OAuth client secret to any authenticated workspace member, regardless of administrative privileges. This disclosure of a private credential directly violates confidentiality principles and, if leveraged, can allow an attacker to impersonate the workspace’s Slack integration or abuse API access. The flaw is rooted in improper handling of sensitive data within the platform, categorized as CWE‑200.
Affected Systems
The vulnerability exists in Windmill open‑source platform versions 1.634.6 and earlier, affecting all deployments of that codebase. Users of Windmill version 1.635.0 and later are not impacted.
Risk and Exploitability
With a CVSS score of 2.7 and an EPSS below 1 %, the risk level is low from a purely statistical perspective, and the issue is not listed in CISA’s KEV catalog. Nonetheless, the attack vector is straightforward: any non‑admin workspace user who can authenticate to the API can request the endpoint and obtain the secret. This capability is feasible with unlimited objects‑oriented user accounts within a workspace, meaning an internal threat actor has a clear path to compromise the Slack integration.
OpenCVE Enrichment