Description
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Versions 1.634.6
and below allow non-admin users to obtain Slack OAuth client secrets, which should only be accessible to workspace administrators. The GET /api/w/{workspace}/workspaces/get_settings endpoint returns the slack_oauth_client_secret to any authenticated workspace member, regardless of their admin status. It is expected behavior for non-admin users see a redacted version of workspace settings, as some of them are necessary for the frontend to behave correctly even for non-admins. However, the Slack configuration should not be visible to non-admins. This is a legacy issue where the setting was stored as a plain value instead of using $variable indirection, and it was never added to the redaction logic. This issue has been fixed in version 1.635.0.
Published: 2026-02-19
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to Slack OAuth client secrets
Action: Apply Patch
AI Analysis

Impact

Windmill’s API endpoint for workspace settings transparently returns the Slack OAuth client secret to any authenticated workspace member, regardless of administrative privileges. This disclosure of a private credential directly violates confidentiality principles and, if leveraged, can allow an attacker to impersonate the workspace’s Slack integration or abuse API access. The flaw is rooted in improper handling of sensitive data within the platform, categorized as CWE‑200.

Affected Systems

The vulnerability exists in Windmill open‑source platform versions 1.634.6 and earlier, affecting all deployments of that codebase. Users of Windmill version 1.635.0 and later are not impacted.

Risk and Exploitability

With a CVSS score of 2.7 and an EPSS below 1 %, the risk level is low from a purely statistical perspective, and the issue is not listed in CISA’s KEV catalog. Nonetheless, the attack vector is straightforward: any non‑admin workspace user who can authenticate to the API can request the endpoint and obtain the secret. This capability is feasible with unlimited objects‑oriented user accounts within a workspace, meaning an internal threat actor has a clear path to compromise the Slack integration.

Generated by OpenCVE AI on April 17, 2026 at 17:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Windmill to version 1.635.0 or later, which removes the secret from the API response.
  • If an upgrade is not immediately possible, restrict API access to the /api/w/{workspace}/workspaces/get_settings endpoint so that only administrators can call it, using role‑based access control or API rate limiting.
  • After remediation, rotate the Slack OAuth client secret to eliminate the risk of any previously exposed credentials being reused.

Generated by OpenCVE AI on April 17, 2026 at 17:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Windmill
Windmill windmill
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:windmill:windmill:*:*:*:*:*:*:*:*
Vendors & Products Windmill
Windmill windmill

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Windmill-labs
Windmill-labs windmill
Vendors & Products Windmill-labs
Windmill-labs windmill

Fri, 20 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Description Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Versions 1.634.6 and below allow non-admin users to obtain Slack OAuth client secrets, which should only be accessible to workspace administrators. The GET /api/w/{workspace}/workspaces/get_settings endpoint returns the slack_oauth_client_secret to any authenticated workspace member, regardless of their admin status. It is expected behavior for non-admin users see a redacted version of workspace settings, as some of them are necessary for the frontend to behave correctly even for non-admins. However, the Slack configuration should not be visible to non-admins. This is a legacy issue where the setting was stored as a plain value instead of using $variable indirection, and it was never added to the redaction logic. This issue has been fixed in version 1.635.0.
Title Windmill Exposes Workspace Slack OAuth Client Secrets to Non-Admin Workspace Members
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Windmill Windmill
Windmill-labs Windmill
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T15:36:28.646Z

Reserved: 2026-02-16T22:20:28.612Z

Link: CVE-2026-26964

cve-icon Vulnrichment

Updated: 2026-02-20T15:26:44.452Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T00:16:16.330

Modified: 2026-04-14T00:50:19.050

Link: CVE-2026-26964

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:45:24Z

Weaknesses