High severity7.5NVD Advisory· Published Mar 6, 2026· Updated Apr 14, 2026
CVE-2026-29059
CVE-2026-29059
Description
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})". The filename parameter is concatenated into a file path without sanitization, allowing an attacker to read arbitrary files on the server using ../ sequences. This issue has been patched in version 1.603.3.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/windmill-labs/windmill/security/advisories/GHSA-24fr-44f8-fqwgnvdVendor Advisory
- github.com/windmill-labs/windmill/releases/tag/v1.603.3nvdRelease Notes
News mentions
0No linked articles in our index yet.