Home

Description

When a DAG failed during parsing, Airflow’s error-reporting in the UI could include the full kwargs passed to the operators. If those kwargs contained sensitive values (such as secrets), they might be exposed in the UI tracebacks to authenticated users who had permission to view that DAG. The issue has been fixed in Airflow 3.1.4 and 2.11.1, and users are strongly advised to upgrade to prevent potential disclosure of sensitive information.

PUBLISHED Reserved 2025-11-18 | Published 2026-02-21 | Updated 2026-02-23 | Assigner apache

Problem types

CWE-209 Generation of Error Message Containing Sensitive Information

Product status

Default status
unaffected

3.0.0 (semver) before 3.1.4
affected

Any version before 2.11.1
affected

Credits

Frieder Gottman (Cariad) finder

Jens Scheffler (Bosch) reporter

Jens Scheffler (Bosch) remediation developer

References

www.openwall.com/lists/oss-security/2025/12/12/2

github.com/apache/airflow/pull/58252 patch

lists.apache.org/thread/1qzlrjo2wmlzs0rrgzgslj2pzkor0dr2 vendor-advisory

github.com/apache/airflow/pull/61883 patch

cve.org (CVE-2025-65995)

nvd.nist.gov (CVE-2025-65995)

Download JSON