CVE-2025-54941
- EPSS 0.12%
- Veröffentlicht 30.10.2025 09:45:26
- Zuletzt bearbeitet 04.11.2025 22:16:29
An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) ...
CVE-2025-62402
- EPSS 0.22%
- Veröffentlicht 30.10.2025 09:14:27
- Zuletzt bearbeitet 04.11.2025 16:51:02
API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.
CVE-2025-62503
- EPSS 0.13%
- Veröffentlicht 30.10.2025 09:11:16
- Zuletzt bearbeitet 04.11.2025 16:52:01
User with CREATE and no UPDATE privilege for Pools, Connections, Variables could update existing records via bulk create API with overwrite action.
CVE-2025-54831
- EPSS 0.07%
- Veröffentlicht 26.09.2025 08:15:38
- Zuletzt bearbeitet 04.11.2025 22:16:29
Apache Airflow 3 introduced a change to the handling of sensitive information in Connections. The intent was to restrict access to sensitive connection fields to Connection Editing Users, effectively applying a "write-only" model for sensitive values...
CVE-2024-45784
- EPSS 1.94%
- Veröffentlicht 15.11.2024 09:15:14
- Zuletzt bearbeitet 03.06.2025 21:12:28
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthori...
CVE-2024-50378
- EPSS 0.27%
- Veröffentlicht 08.11.2024 15:15:06
- Zuletzt bearbeitet 10.07.2025 21:39:16
Airflow versions before 2.10.3 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive variables were set via airflow CLI, values of those variables ap...
CVE-2024-45498
- EPSS 1.53%
- Veröffentlicht 07.09.2024 08:15:11
- Zuletzt bearbeitet 03.06.2025 21:12:43
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of you...
CVE-2024-45034
- EPSS 2.99%
- Veröffentlicht 07.09.2024 08:15:11
- Zuletzt bearbeitet 03.06.2025 21:12:55
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users a...
CVE-2024-41937
- EPSS 0.35%
- Veröffentlicht 21.08.2024 16:15:08
- Zuletzt bearbeitet 20.03.2025 21:15:21
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on...
CVE-2024-39877
- EPSS 0.19%
- Veröffentlicht 17.07.2024 08:15:02
- Zuletzt bearbeitet 21.11.2024 09:28:28
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Air...