Description
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Workspace environment variable values are interpolated into JavaScript string literals without escaping single quotes in the NativeTS executor. A workspace admin who sets a custom environment variable with a value containing `'` can inject arbitrary JavaScript that executes inside every NativeTS script in that workspace. This is a code injection bug in `worker.rs`, not related to the sandbox/NSJAIL topic. Version 1.664.0 patches the issue.
INFO
Published Date :
2026-03-27T20:34:32.606Z
Last Modified :
2026-04-01T03:55:36.629Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33881 vulnerability.
| Vendors | Products |
|---|---|
| Windmill |
|
| Windmill-labs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33881.