Apache AirFlow
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache AirFlow.
Known Exploited Apache AirFlow Vulnerabilities
The following Apache AirFlow vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Apache Airflow Command Injection |
A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow. CVE-2020-11978 Exploit Probability: 94.3% |
January 18, 2022 |
The vulnerability CVE-2020-11978: Apache Airflow Command Injection is in the top 1% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 27 vulnerabilities in Apache AirFlow with an average score of 7.1 out of ten. Last year, in 2025 AirFlow had 11 security vulnerabilities published. That is, 16 more vulnerabilities have already been reported in 2026 as compared to last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.81.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 27 | 7.09 |
| 2025 | 11 | 6.29 |
| 2024 | 20 | 6.72 |
| 2023 | 46 | 7.22 |
| 2022 | 19 | 7.56 |
| 2021 | 6 | 6.38 |
| 2020 | 12 | 7.19 |
| 2019 | 7 | 6.80 |
| 2018 | 1 | 0.00 |
It may take a day or so for new AirFlow vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache AirFlow Security Vulnerabilities
Keycloak Auth in apache-airflow-providers-keycloak: CSRF, no state/PKCE (<0.7.0)
CVE-2026-40948
5.4 - Medium
- April 18, 2026
The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or validate the OAuth 2.0 `state` parameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim's browser and cause the victim to be logged into the attacker's Airflow session (login-CSRF / session fixation), where any credentials the victim subsequently stored in Airflow Connections would be harvestable by the attacker. Users are advised to upgrade `apache-airflow-providers-keycloak` to 0.7.0 or later.
Session Riding
Apache Airflow <3.2 Secrets in JSON Variables not redacted
CVE-2026-32690
3.7 - Low
- April 18, 2026
Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked. If you do not store variables with sensitive values in JSON form, you are not affected. Otherwise please upgrade to Apache Airflow 3.2.0 that has the fix implemented
Exposure of Resource to Wrong Sphere
Apache Airflow BashOperator unsanitized dag_run.conf leads to code exec
CVE-2026-30898
8.8 - High
- April 18, 2026
An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
Command Injection
SQL Error Stack Trace Exposed in Apache Airflow API (pre-3.2.0)
CVE-2026-30912
7.5 - High
- April 18, 2026
In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Exposure of Resource to Wrong Sphere
Apache Airflow: RCE via XCom by DAG Authors (before 3.2.0)
CVE-2026-25917
9.8 - Critical
- April 18, 2026
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Marshaling, Unmarshaling
Airflow v3.2.0 Fix: UI/API Dags Access Control Vulnerability
CVE-2026-32228
7.5 - High
- April 18, 2026
UI / API User with asset materialize permission could trigger dags they had no access to. Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.
AuthZ
Apache Airflow <3.2: JWT logs expose Dag authors (CVE-2026-31987)
CVE-2026-31987
7.5 - High
- April 16, 2026
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Insertion of Sensitive Information into Log File
Airflow <3.2.0: Unmasked conn_key/conn_string expose secrets
CVE-2026-25219
6.5 - Medium
- April 15, 2026
The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidentaly logged to logs, those values could be seen in the logs. Azure Service Bus used those properties to store sensitive values. Possibly other providers could be also affected if they used the same fields to store sensitive data. If you used Azure Service Bus connection with those values set or if you have other connections with those values storing sensitve values, you should upgrade Airflow to 3.1.8
Information Disclosure
Apache Airflow 3.2 Unsafe XCom Pattern (CVE-2025-54550)
CVE-2025-54550
8.1 - High
- April 15, 2026
The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary execution of code on the worker. Since the UI users are already highly trusted, this is a Low severity vulnerability. It does not affect Airflow release - example_dags are not supposed to be enabled in production environment, however users following the example could replicate the bad pattern. Documentation of Airflow 3.2.0 contains version of the example with improved resiliance for that case. Users who followed that pattern are advised to adjust their implementations accordingly.
Code Injection
Apache Airflow 3.2.0: XCom payload enables DAG-author code exec
CVE-2026-33858
8.8 - High
- April 13, 2026
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.
Marshaling, Unmarshaling
Airflow<3.2: Ambiguous Security Model & JWT Auth, Upgrade Required
CVE-2025-66236
7.5 - High
- April 13, 2026
Before Airflow 3.2.0, it was unclear that secure Airflow deployments require the Deployment Manager to take appropriate actions and pay attention to security details and security model of Airflow. Some assumptions the Deployment Manager could make were not clear or explicit enough, even though Airflow's intentions and security model of Airflow did not suggest different assumptions. The overall security model [1], workload isolation [2], and JWT authentication details [3] are now described in more detail. Users concerned with role isolation and following the Airflow security model of Airflow are advised to upgrade to Airflow 3.2, where several security improvements have been implemented. They should also read and follow the relevant documents to make sure that their deployment is secure enough. It also clarifies that the Deployment Manager is ultimately responsible for securing your Airflow deployment. This had also been communicated via Airflow 3.2.0 Blog announcement [4]. [1] Security Model: https://airflow.apache.org/docs/apache-airflow/stable/security/jwt_token_authentication.html [2] Workload isolation: https://airflow.apache.org/docs/apache-airflow/stable/security/workload.html [3] JWT Token authentication: https://airflow.apache.org/docs/apache-airflow/stable/security/jwt_token_authentication.html [4] Airflow 3.2.0 Blog announcement: https://airflow.apache.org/blog/airflow-3.2.0/ Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Insertion of Sensitive Information into Log File
Airflow JWT Token Not Invalidate at Logout (fixed in 3.2)
CVE-2025-57735
9.1 - Critical
- April 09, 2026
When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+ Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Insufficient Session Expiration
Apache Airflow v3.0-3.1.8 DagRun API leaks XCom to Viewer role
CVE-2026-34538
6.5 - Medium
- April 09, 2026
Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom result values even to users who only have DAG Run read permissions, such as the Viewer role.This behavior conflicts with the FAB RBAC model, which treats XCom as a separate protected resource, and with the security model documentation that defines the Viewer role as read-only. Airflow uses the FAB Auth Manager to manage access control on a per-resource basis. The Viewer role is intended to be read-only by default, and the security model documentation defines Viewer users as those who can inspect DAGs without accessing sensitive execution results. Users are recommended to upgrade to Apache Airflow 3.2.0 which resolves this issue.
Exposure of Resource to Wrong Sphere
Apache Airflow Provider for Databricks: Improper Cert Validation ( < 1.12.0 )
CVE-2026-32794
4.8 - Medium
- March 30, 2026
Improper Certificate Validation vulnerability in Apache Airflow Provider for Databricks. Provider code did not validate certificates for connections to Databricks back-end which could result in a man-of-a-middle attack that traffic is intercepted and manipulated or credentials exfiltrated w/o notice. This issue affects Apache Airflow Provider for Databricks: from 1.10.0 before 1.12.0. Users are recommended to upgrade to version 1.12.0, which fixes the issue.
Improper Certificate Validation
Apache Airflow <=3.1.7 DAG Dependency Enum via /ui/dependencies
CVE-2026-28563
4.3 - Medium
- March 17, 2026
Apache Airflow versions 3.1.0 through 3.1.7 /ui/dependencies endpoint returns the full DAG dependency graph without filtering by authorized DAG IDs. This allows an authenticated user with only DAG Dependencies permission to enumerate DAGs they are not authorized to view. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Incorrect Permission Assignment for Critical Resource
Apache Airflow 3.0.0-3.1.7: FastAPI DagVersion API Auth Bypass (~ wildcard)
CVE-2026-26929
6.5 - Medium
- March 17, 2026
Apache Airflow versions 3.0.0 through 3.1.7 FastAPI DagVersion listing API does not apply per-DAG authorization filtering when the request is made with dag_id set to "~" (wildcard for all DAGs). As a result, version metadata of DAGs that the requester is not authorized to access is returned. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Incorrect Permission Assignment for Critical Resource
Apache Airflow 3.1.0-3.1.7 Missing Auth in HITL Exec API (Fix 3.1.8)
CVE-2026-30911
8.1 - High
- March 17, 2026
Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other task instance. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
AuthZ
Apache Airflow 3.1.0-3.1.7 Cookie Path Leak Allows Session Takeover
CVE-2026-28779
7.5 - High
- March 17, 2026
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Exposure of Resource to Wrong Sphere
Apache AWS Auth Manager SAML Origin Validation Flaw before 9.22.0
CVE-2026-25604
5.4 - Medium
- March 09, 2026
In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL. This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances. You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager.
Origin Validation Error
Apache Airflow Triggerer DB Code Exec, fixed v6.0.0
CVE-2025-69219
8.8 - High
- March 09, 2026
A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk.
Improper Control of Dynamically-Managed Code Resources
Airflow <2.11.1 Auth. Audit Log Exposure of Connection Secrets
CVE-2025-27555
6.5 - Medium
- February 24, 2026
Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378
Insertion of Sensitive Information into Log File
Apache Airflow 2 RCE via log template history (pre2.11.1, 2.11.1+)
CVE-2024-56373
8.4 - High
- February 24, 2026
DAG Author (who already has quite a lot of permissions) could manipulate database of Airflow 2 in the way to execute arbitrary code in the web-server context, which they should normally not be able to do, leading to potentially remote code execution in the context of web-server (server-side) as a result of a user viewing historical task information. The functionality responsible for that (log template history) has been disabled by default in 2.11.1 and users should upgrade to Airflow 3 if they want to continue to use log template history. They can also manually modify historical log file names if they want to see historical logs that were generated before the last log template change.
Code Injection
Airflow UI Leak of Operator Kwargs in Tracebacks Fixed in 3.1.4 & 2.11.1
CVE-2025-65995
6.5 - Medium
- February 21, 2026
When a DAG failed during parsing, Airflows error-reporting in the UI could include the full kwargs passed to the operators. If those kwargs contained sensitive values (such as secrets), they might be exposed in the UI tracebacks to authenticated users who had permission to view that DAG. The issue has been fixed in Airflow 3.1.4 and 2.11.1, and users are strongly advised to upgrade to prevent potential disclosure of sensitive information.
Generation of Error Message Containing Sensitive Information
Apache Airflow 3.1.03.1.6 Auth Flaw: Task Logs Exposed
CVE-2026-22922
6.5 - Medium
- February 09, 2026
Apache Airflow versions 3.1.0 through 3.1.6 contain an authorization flaw that can allow an authenticated user with custom permissions limited to task access to view task logs without having task log access. Users are recommended to upgrade to Apache Airflow 3.1.7 or later, which resolves this issue.
Incorrect Use of Privileged APIs
Apache Airflow <3.1.7: Authenticated UI Users Can View Other DAG Errors
CVE-2026-24098
6.5 - Medium
- February 09, 2026
Apache Airflow versions 3.0.0 - 3.1.7, has vulnerability that allows authenticated UI users with permission to one or more specific Dags to view import errors generated by other Dags they did not have access to. Users are advised to upgrade to 3.1.7 or later, which resolves this issue
Information Disclosure
Apache Airflow <3.1.6 Log Leak via Proxy Credentials in Connection Fields
CVE-2025-68675
7.5 - High
- January 16, 2026
In Apache Airflow versions before 3.1.6, and 2.11.1 the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later for Airflow 3, and 2.11.1 or later for Airflow 2 which fixes this issue
Insertion of Sensitive Information into Log File
Apache Airflow <3.1.6 Rendered Template UI Secrets Exposure
CVE-2025-68438
7.5 - High
- January 16, 2026
In Apache Airflow versions before 3.1.6, when rendered template fields in a Dag exceed [core] max_templated_field_length, sensitive values could be exposed in cleartext in the Rendered Templates UI. This occurred because serialization of those fields used a secrets masker instance that did not include user-registered mask_secret() patterns, so secrets were not reliably masked before truncation and display. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue
Information Disclosure
Edge3 Provider RCE via Worker RPC in Apache Airflow 2 (<2.0.0)
CVE-2025-67895
9.8 - Critical
- December 17, 2025
Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.
Incorrect Resource Transfer Between Spheres
Apache Airflow <3.1.4 UI Secret Exposure via Unredacted Templates
CVE-2025-66388
4.3 - Medium
- December 15, 2025
A vulnerability in Apache Airflow allowed authenticated UI users to view secret values in rendered templates due to secrets not being properly redacted, potentially exposing secrets to users without the appropriate authorization. Users are recommended to upgrade to version 3.1.4, which fixes this issue.
Insertion of Sensitive Information Into Sent Data
Airflow example_dag_decorator XSS Redirect & RCE vuln (fixed v3.0.5)
CVE-2025-54941
4.6 - Medium
- October 30, 2025
An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) or the example dag code copied to build your own similar dag. If you used the `example_dag_decorator` please review it and apply the changes implemented in Airflow 3.0.5 accordingly.
Shell injection
CVE202562402: Arbitrary Dag Code Execution via /api/v2/dagReports
CVE-2025-62402
5.4 - Medium
- October 30, 2025
API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.
Execution with Unnecessary Privileges
Azure DevOps: CREATE users can overwrite Pools, Connections, Variables via bulk API
CVE-2025-62503
4.6 - Medium
- October 30, 2025
User with CREATE and no UPDATE privilege for Pools, Connections, Variables could update existing records via bulk create API with overwrite action.
Execution with Unnecessary Privileges
Apache Airflow 3.0.3 Connections Sensitive Fields Exposed to READ Users
CVE-2025-54831
6.5 - Medium
- September 26, 2025
Apache Airflow 3 introduced a change to the handling of sensitive information in Connections. The intent was to restrict access to sensitive connection fields to Connection Editing Users, effectively applying a "write-only" model for sensitive values. In Airflow 3.0.3, this model was unintentionally violated: sensitive connection information could be viewed by users with READ permissions through both the API and the UI. This behavior also bypassed the `AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS` configuration option. This issue does not affect Airflow 2.x, where exposing sensitive information to connection editors was the intended and documented behavior. Users of Airflow 3.0.3 are advised to upgrade Airflow to >=3.0.4.
Exposure of Sensitive Information Due to Incompatible Policies
dag-factory 0.23.0a8 RCE via GitHub Actions misconfig
CVE-2025-54415
- July 26, 2025
dag-factory is a library for Apache Airflow® to construct DAGs declaratively via configuration files. In versions 0.23.0a8 and below, a high-severity vulnerability has been identified in the cicd.yml workflow within the astronomer/dag-factory GitHub repository. The workflow, specifically when triggered by pull_request_target, is susceptible to exploitation, allowing an attacker to execute arbitrary code within the GitHub Actions runner environment. This misconfiguration enables an attacker to establish a reverse shell, exfiltrate sensitive secrets, including the highly-privileged GITHUB_TOKEN, and ultimately gain full control over the repository. This is fixed in version 0.23.0a9.
Shell injection
Apache Airflow Providers Snowflake <6.4.0: Special Element Injection
CVE-2025-50213
- June 24, 2025
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) vulnerability in Apache Airflow Providers Snowflake. This issue affects Apache Airflow Providers Snowflake: before 6.4.0. Sanitation of table and stage parameters were added in CopyFromExternalStageToSnowflakeOperator to prevent SQL injection Users are recommended to upgrade to version 6.4.0, which fixes the issue.
Special Element Injection
Apache Airflow SQL Provider <1.24.1 SQL Injection via SQLTableCheckOperator
CVE-2025-30473
8.8 - High
- April 07, 2025
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider. When using the partition clause in SQLTableCheckOperator as parameter (which was a recommended pattern), Authenticated UI User could inject arbitrary SQL command when triggering DAG exposing partition_clause to the user. This allowed the DAG Triggering user to escalate privileges to execute those arbitrary commands which they normally would not have. This issue affects Apache Airflow Common SQL Provider: before 1.24.1. Users are recommended to upgrade to version 1.24.1, which fixes the issue.
SQL Injection
Apache Airflow MySQL Provider SQLi in dump_sql/load_sql before 6.2.0
CVE-2025-27018
- March 19, 2025
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow MySQL Provider. When user triggered a DAG with dump_sql or load_sql functions they could pass a table parameter from a UI, that could cause SQL injection by running SQL that was not intended. It could lead to data corruption, modification and others. This issue affects Apache Airflow MySQL Provider: before 6.2.0. Users are recommended to upgrade to version 6.2.0, which fixes the issue.
SQL Injection
Apache Airflow FAB Provider <1.5.2: Insufficient Session Expiration (CVE-2024-45033)
CVE-2024-45033
- January 08, 2025
Insufficient Session Expiration vulnerability in Apache Airflow Fab Provider. This issue affects Apache Airflow Fab Provider: before 1.5.2. When user password has been changed with admin CLI, the sessions for that user have not been cleared, leading to insufficient session expiration, thus logged users could continue to be logged in even after the password was changed. This only happened when the password was changed with CLI. The problem does not happen in case change was done with webserver thus this is different from CVE-2023-40273 https://github.com/advisories/GHSA-pm87-24wq-r8w9 which was addressed in Apache-Airflow 2.7.0 Users are recommended to upgrade to version 1.5.2, which fixes the issue.
Insufficient Session Expiration
Apache Airflow Sensitive Configuration Variable Exposure in Task Logs
CVE-2024-45784
- November 15, 2024
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized users could access these logs, potentially exposing critical data that could be exploited to compromise the security of the Airflow deployment. In version 2.10.3, secrets are now masked in task logs to prevent sensitive configuration variables from being exposed in the logging output. Users should upgrade to Airflow 2.10.3 or the latest version to eliminate this vulnerability. If you suspect that DAG authors could have logged the secret values to the logs and that your logs are not additionally protected, it is also recommended that you update those secrets.
Airflow Audit Log Sensitive Data Exposure before 2.10.3 - November 2024
CVE-2024-50378
- November 08, 2024
Airflow versions before 2.10.3 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive variables were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.10.3 or a later version, which addresses this issue. Users who previously used the CLI to set secret variables should manually delete entries with those variables from the log table.
Insertion of Sensitive Information Into Sent Data
Apache Airflow Scheduler Exec via DAG Local Settings Before 2.10.1
CVE-2024-45034
- September 07, 2024
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.
Apache Airflow 2.10.0 Example DAG RCE via Authenticated Trigger - Fixed 2.10.1
CVE-2024-45498
- September 07, 2024
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.
Output Sanitization
Apache Airflow <=2.9.9 XSS via provider link click
CVE-2024-41937
6.1 - Medium
- August 21, 2024
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and the user to click the provider link. Users should upgrade to 2.10.0 or later, which fixes this vulnerability.
XSS
Apache Airflow FAB 1.2.1: Insufficient Session Expiration (Logout Prevention)
CVE-2024-42447
9.8 - Critical
- August 05, 2024
Insufficient Session Expiration vulnerability in Apache Airflow Providers FAB. This issue affects Apache Airflow Providers FAB: 1.2.1 (when used with Apache Airflow 2.9.3) and FAB 1.2.0 for all Airflow versions. The FAB provider prevented the user from logging out. * FAB provider 1.2.1 only affected Airflow 2.9.3 (earlier and later versions of Airflow are not affected) * FAB provider 1.2.0 affected all versions of Airflow. Users who run Apache Airflow 2.9.3 are recommended to upgrade to Apache Airflow Providers FAB version 1.2.2 which fixes the issue. Users who run Any Apache Airflow version and have FAB provider 1.2.0 are recommended to upgrade to Apache Airflow Providers FAB version 1.2.2 which fixes the issue. Also upgrading Apache Airflow to latest version available is recommended. Note: Early version of Airflow reference container images of Airflow 2.9.3 and constraint files contained FAB provider 1.2.1 version, but this is fixed in updated versions of the images. Users are advised to pull the latest Airflow images or reinstall FAB provider according to the current constraints.
Insufficient Session Expiration
Apache Airflow 2.4.0+ Auth DAG Exec via doc_md - Fixed in 2.9.3
CVE-2024-39877
8.8 - High
- July 17, 2024
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability.
Code Injection
Authenticated link injection in Apache Airflow <2.9.3 (CVE-2024-39863)
CVE-2024-39863
5.4 - Medium
- July 17, 2024
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.
XSS
Apache Airflow: Missing Cache-Control Header ( 2.9.1)
CVE-2024-25142
5.5 - Medium
- June 14, 2024
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow. Airflow did not return "Cache-Control" header for dynamic content, which in case of some browsers could result in potentially storing sensitive data in local cache of the browser. This issue affects Apache Airflow: before 2.9.2. Users are recommended to upgrade to version 2.9.2, which fixes the issue.
Use of Web Browser Cache Containing Sensitive Information
Airflow 2.9.0 Log Injection via Authenticated Attack
CVE-2024-32077
5.4 - Medium
- May 14, 2024
Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs. Users are recommended to upgrade to version 2.9.1, which fixes this issue.
Apache Airflow FTP Provider Improper Cert Validation (before 3.7.0)
CVE-2024-29733
- April 21, 2024
Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly. This issue affects Apache Airflow FTP Provider: before 3.7.0. Users are recommended to upgrade to version 3.7.0, which fixes the issue.
Improper Certificate Validation
Airflow 2.72.8.4 Authenticated UI Exposes Provider Config (CVE-2024-31869)
CVE-2024-31869
4.3 - Medium
- April 18, 2024
Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache AirFlow or by Apache? Click the Watch button to subscribe.