Home

Description

JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.

PUBLISHED Reserved 2026-02-18 | Published 2026-05-19 | Updated 2026-05-19 | Assigner apache

Problem types

CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory

Product status

Default status
unaffected

Any version before 10.17.0
affected

Credits

Nikolai Dvoinishnikov, Welltory finder

Anton Kuznetsov, Welltory finder

Anish Giri remediation developer

References

www.openwall.com/lists/oss-security/2026/05/19/35

github.com/apache/airflow/pull/60108 patch

lists.apache.org/thread/pk3m2z4s2rkmc0v6gh9hnch9spc6stqw vendor-advisory

cve.org (CVE-2026-27173)

nvd.nist.gov (CVE-2026-27173)

Download JSON