Apache

Airflow

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 30.04.2026 09:09:45
  • Zuletzt bearbeitet 01.05.2026 17:54:49

Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could presen...

  • EPSS 0.06%
  • Veröffentlicht 24.04.2026 12:36:40
  • Zuletzt bearbeitet 27.04.2026 12:24:28

The authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance records: a logged-in Airflow user with read access to at least one DAG could retrieve HITL prompts (including their reque...

  • EPSS 0.07%
  • Veröffentlicht 24.04.2026 12:35:33
  • Zuletzt bearbeitet 27.04.2026 12:24:56

The asset dependency graph did not restrict nodes by the viewer's DAG read permissions: a user with read access to at least one DAG could browse the asset graph for any other asset in the deployment and learn the existence and names of DAGs and asset...

  • EPSS 0.1%
  • Veröffentlicht 18.04.2026 06:22:26
  • Zuletzt bearbeitet 21.04.2026 14:41:08

Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked. If you do not store variables with sensitive values in JSON form, you...

Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 18.04.2026 06:20:48
  • Zuletzt bearbeitet 21.04.2026 14:43:36

An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 18.04.2026 06:20:30
  • Zuletzt bearbeitet 21.04.2026 14:42:49

In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 18.04.2026 06:20:11
  • Zuletzt bearbeitet 22.04.2026 14:16:36

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are re...

  • EPSS 0.1%
  • Veröffentlicht 18.04.2026 06:19:47
  • Zuletzt bearbeitet 21.04.2026 12:54:57

UI / API User with asset materialize permission could trigger dags they had no access to. Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.

  • EPSS 0.12%
  • Veröffentlicht 16.04.2026 13:31:52
  • Zuletzt bearbeitet 20.04.2026 16:54:59

JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.

  • EPSS 0.03%
  • Veröffentlicht 15.04.2026 12:30:17
  • Zuletzt bearbeitet 17.04.2026 18:37:33

The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidentaly logged to...