We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30473

Apache Airflow Common SQL Provider: Remote Code Execution via Sql Injection



Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider. When using the partition clause in SQLTableCheckOperator as parameter (which was a recommended pattern), Authenticated UI User could inject arbitrary SQL command when triggering DAG exposing partition_clause to the user. This allowed the DAG Triggering user to escalate privileges to execute those arbitrary commands which they normally would not have. This issue affects Apache Airflow Common SQL Provider: before 1.24.1. Users are recommended to upgrade to version 1.24.1, which fixes the issue.

Reserved 2025-03-22 | Published 2025-04-07 | Updated 2025-04-08 | Assigner apache

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version before 1.24.1
affected

Credits

nxczje reporter

References

github.com/apache/airflow/pull/48098 patch

lists.apache.org/thread/53klkv790cylqcop0350w7nfq1y6h0t2 vendor-advisory

cve.org (CVE-2025-30473)

nvd.nist.gov (CVE-2025-30473)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30473

Support options

Helpdesk Chat, Email, Knowledgebase