[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-47107":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-19T22:43:29.387Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":131,"aliases":132,"duplicate_of":9,"upstream":133,"downstream":134,"duplicates":135,"related":136,"reserved_at":9,"published_at":137,"modified_at":138,"state":139,"summary":140,"references_raw":147,"kevs":168,"epss":9,"epss_history":169,"metrics":170,"affected":183},"CVE-2026-47107","Windmill prior to 1.703.2 contains an incorrect default permissions vulnerability in nsjail sandbox configuration files where /etc is bind-mounted without read-write restrictions, allowing authenticated users to write arbitrary entries to /etc/hosts, /etc/resolv.conf, and /etc/ssl/certs/ca-certificates.crt from within script execution sandboxes. Attackers can exploit persistent poisoned entries across all subsequent script executions on the same worker pod to redirect hostnames, intercept DNS queries, perform transparent HTTPS man-in-the-middle attacks, and intercept WM_TOKEN JWTs to gain workspace-admin access to victim workspaces across tenants.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-276","Incorrect Default Permissions","During installation, installed file permissions are set to allow anyone to modify those files.","weakness","Draft","Base","Medium",[20,68,127],{"id":21,"name":22,"techniques":23},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[24],{"id":25,"name":26,"tactics":27,"countermeasures":43},"T1574.010","Services File Permissions Weakness",[28,31,34,37,40],{"id":29,"name":30},"TA0110","Persistence",{"id":32,"name":33},"TA0111","Privilege Escalation",{"id":35,"name":36},"TA0030","Defense Evasion",{"id":38,"name":39},"TA0005","Stealth",{"id":41,"name":42},"TA0104","Execution",[44,49,53,58,63],{"id":45,"name":46,"tactic":47},"D3-SWI","Software Inventory",{"name":48},"Model",{"id":50,"name":51,"tactic":52},"D3-AVE","Asset Vulnerability Enumeration",{"name":48},{"id":54,"name":55,"tactic":56},"D3-SBV","Service Binary Verification",{"name":57},"Detect",{"id":59,"name":60,"tactic":61},"D3-SU","Software Update",{"name":62},"Harden",{"id":64,"name":65,"tactic":66},"D3-RS","Restore Software",{"name":67},"Restore",{"id":69,"name":70,"techniques":71},"CAPEC-127","Directory Indexing",[72],{"id":73,"name":74,"tactics":75,"countermeasures":79},"T1083","File and Directory Discovery",[76],{"id":77,"name":78},"TA0102","Discovery",[80,84,88,93,98,102,106,111,115,119,123],{"id":81,"name":82,"tactic":83},"D3-FA","File Analysis",{"name":57},{"id":85,"name":86,"tactic":87},"D3-FIM","File Integrity Monitoring",{"name":57},{"id":89,"name":90,"tactic":91},"D3-FEV","File Eviction",{"name":92},"Evict",{"id":94,"name":95,"tactic":96},"D3-DF","Decoy File",{"name":97},"Deceive",{"id":99,"name":100,"tactic":101},"D3-FE","File Encryption",{"name":62},{"id":103,"name":104,"tactic":105},"D3-RF","Restore File",{"name":67},{"id":107,"name":108,"tactic":109},"D3-LFP","Local File Permissions",{"name":110},"Isolate",{"id":112,"name":113,"tactic":114},"D3-CF","Content Filtering",{"name":110},{"id":116,"name":117,"tactic":118},"D3-RFAM","Remote File Access Mediation",{"name":110},{"id":120,"name":121,"tactic":122},"D3-CQ","Content Quarantine",{"name":110},{"id":124,"name":125,"tactic":126},"D3-CM","Content Modification",{"name":110},{"id":128,"name":129,"techniques":130},"CAPEC-81","Web Server Logs Tampering",[],[],[],[],[],[],[],"2026-05-19T16:42:55.144Z","2026-05-19T18:36:27.927Z","Deferred",{"cisa_kev":141,"cisa_ransomware":141,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":142,"severity_score":143,"severity_version":144,"severity_source":145,"severity_vector":146,"severity_status":139},false,"critical",9.6,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",[148,154,159,164],{"url":149,"sources":150,"tags":152},"https://github.com/windmill-labs/windmill/releases/tag/v1.703.2",[145,151],"nvd",[153],"Release Notes",{"url":155,"sources":156,"tags":157},"https://github.com/windmill-labs/windmill/pull/9194",[145,151],[158],"Issue Tracking",{"url":160,"sources":161,"tags":162},"https://github.com/windmill-labs/windmill/commit/f8467f38c8a053117ce62f96684cfb15ef792f08",[145,151],[163],"Patch",{"url":165,"sources":166,"tags":167},"https://www.vulncheck.com/advisories/windmill-incorrect-default-permissions-in-nsjail-configuration",[145,151],[],[],[],[171,179],{"source":145,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":172,"cvss_v4_0":176},{"baseScore":143,"baseSeverity":173,"vectorString":146,"impactScore":174,"exploitabilityScore":175},"CRITICAL",9.7,7.9,{"baseScore":177,"baseSeverity":173,"vectorString":178,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N",{"source":151,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":180,"cvss_v4_0":181},{"baseScore":143,"baseSeverity":173,"vectorString":146,"impactScore":174,"exploitabilityScore":175},{"baseScore":177,"baseSeverity":173,"vectorString":182,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[184],{"ecosystem":9,"name":185,"vendor":186,"product":185,"cpe_part":187,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":188},"windmill","windmill-labs","a",[189],{"version":190,"is_range":191,"range_type":145,"version_start":9,"version_start_type":9,"version_end":192,"version_end_type":193,"fixed_in":9},"\u003C 1.703.2",true,"1.703.2","excluding"]