High severity7.2NVD Advisory· Published Mar 27, 2026· Updated Apr 8, 2026
CVE-2026-33881
CVE-2026-33881
Description
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Workspace environment variable values are interpolated into JavaScript string literals without escaping single quotes in the NativeTS executor. A workspace admin who sets a custom environment variable with a value containing ' can inject arbitrary JavaScript that executes inside every NativeTS script in that workspace. This is a code injection bug in worker.rs, not related to the sandbox/NSJAIL topic. Version 1.664.0 patches the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/windmill-labs/windmill/security/advisories/GHSA-8q8j-mm3g-5c2qnvdExploitMitigationVendor Advisory
News mentions
0No linked articles in our index yet.