CVE-2026-22683
Description
Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability that allows users with the Operator role to perform prohibited entity creation and modification actions via the backend API. Although Operators are documented and priced as unable to create or modify entities, the API does not enforce the Operator restriction on workspace endpoints, allowing an Operator to create and update scripts, flows, apps, and raw_apps. Since Operators can also execute scripts via the jobs API, this allows direct privilege escalation to remote code execution within the Windmill deployment. This vulnerability has existed since the introduction of the Operator role in version 1.56.0.
Affected products
2Patches
1c621a74804f4Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/windmill-labs/windmill/commit/c621a74804f4f6e8318819c01e3a23a17698588bnvdPatch
- chocapikk.com/posts/2026/windfall-nextcloud-flow-windmill-rce/nvdVendor Advisory
- apps.nextcloud.com/apps/flow/releasesnvdRelease Notes
- github.com/windmill-labs/windmill/releases/tag/v1.615.0nvdRelease Notes
- www.windmill.devnvdProduct
News mentions
0No linked articles in our index yet.