Home

Description

Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378

PUBLISHED Reserved 2025-03-01 | Published 2026-02-24 | Updated 2026-02-24 | Assigner apache

Problem types

CWE-201 Insertion of Sensitive Information Into Sent Data

Product status

Default status
unaffected

Any version before 2.11.1
affected

Credits

sw0rd1ight finder

References

github.com/apache/airflow/pull/61882 patch

lists.apache.org/thread/nxovkp319jo8vg498gql1yswtb2frbkw vendor-advisory

cve.org (CVE-2025-27555)

nvd.nist.gov (CVE-2025-27555)

Download JSON