Back to CVE List

CVE-2026-41016

Vulnerability Description

Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix.

Vulnerability Details

Published Date
Last Modified
CWE ID
CWE-295
Source
NVD
Vendor
Apache Software Foundation
Product
Apache Airflow Providers SMTP

External References

Discussion (0)

Add Comment

No comments yet. Be the first!