Total CVEs

126,140

Critical Severity

2,292

High Severity

7,933

Last 7 Days

1,188
Quick preset (or use dates below)
Clear Filters
Showing 1 - 20 of 67 CVEs
CVE-2026-41016 MEDIUM - 5.9

Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete th...

Vendor: Apache Software Foundation
Product: Apache Airflow Providers SMTP
Published: Apr 30, 2026
Source: NVD
CVE-2026-40690 MEDIUM - 4.3

The asset dependency graph did not restrict nodes by the viewer's DAG read permissions: a user with read access to at least one DAG could browse the asset graph for any other asset in the deployment and learn the existence and names of DAGs and assets outside their authorized scope. Users are ...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 24, 2026
Source: NVD
CVE-2026-38743 MEDIUM - 4.3

The authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance records: a logged-in Airflow user with read access to at least one DAG could retrieve HITL prompts (including their request parameters) and full TaskInstance details for D...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 24, 2026
Source: NVD
CVE-2026-40948 MEDIUM - 5.4

The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or validate the OAuth 2.0 `state` parameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 18, 2026
Source: NVD

Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked. If you do not store variables with sensitive values in JSON form, you are not affected. Otherwise please upgrade to Apa...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 18, 2026
Source: NVD
CVE-2026-32228 HIGH - 7.5

UI / API User with asset materialize permission could trigger dags they had no access to. Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 18, 2026
Source: NVD
CVE-2026-30912 HIGH - 7.5

In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 18, 2026
Source: NVD
CVE-2026-30898 HIGH - 8.8

An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 18, 2026
Source: NVD
CVE-2026-25917 CRITICAL - 9.8

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, whic...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 18, 2026
Source: NVD
CVE-2026-31987 MEDIUM - 7.5

JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 16, 2026
Source: NVD
CVE-2026-25219 MEDIUM - 6.5

The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidentaly logged to logs, those values could be seen in the logs. Azu...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 15, 2026
Source: NVD
CVE-2025-54550 HIGH - 8.1

The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary execution of code on the worker. Since the UI users are already highly tru...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 15, 2026
Source: NVD
CVE-2026-33858 HIGH - 8.8

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, whi...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 13, 2026
Source: NVD
CVE-2025-66236 HIGH - 7.5

Before Airflow 3.2.0, it was unclear that secure Airflow deployments require the Deployment Manager to take appropriate actions and pay attention to security details and security model of Airflow. Some assumptions the Deployment Manager could make were not clear or explicit enough, even though Airfl...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 13, 2026
Source: NVD
CVE-2025-57735 CRITICAL - 9.1

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario an...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 09, 2026
Source: NVD
CVE-2026-34538 MEDIUM - 6.5

Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom result values even to users who only have DAG Run read permissions, such as the Viewer role.This behavior conflicts with the FAB RBAC model, which treats XCom as a separate protected resource, and with the security model d...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Apr 09, 2026
Source: NVD
CVE-2026-32794 MEDIUM - 4.8

Improper Certificate Validation vulnerability in Apache Airflow Provider for Databricks. Provider code did not validate certificates for connections to Databricks back-end which could result in a man-of-a-middle attack that traffic is intercepted and manipulated or credentials exfiltrated w/o notice...

Vendor: Apache Software Foundation
Product: Apache Airflow Provider for Databricks
Published: Mar 30, 2026
Source: NVD
CVE-2026-30911 HIGH - 8.1

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other task instance. Users are recommended to upgra...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Mar 17, 2026
Source: NVD
CVE-2026-28779 HIGH - 7.5

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing ...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Mar 17, 2026
Source: NVD
CVE-2026-28563 MEDIUM - 4.3

Apache Airflow versions 3.1.0 through 3.1.7 /ui/dependencies endpoint returns the full DAG dependency graph without filtering by authorized DAG IDs. This allows an authenticated user with only DAG Dependencies permission to enumerate DAGs they are not authorized to view. Users are recommended to u...

Vendor: Apache Software Foundation
Product: Apache Airflow
Published: Mar 17, 2026
Source: NVD