Description
JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.
Problem types
CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory
Product status
Any version before 10.17.0
Credits
Nikolai Dvoinishnikov, Welltory
Anton Kuznetsov, Welltory
Anish Giri
References
www.openwall.com/lists/oss-security/2026/05/19/35
github.com/apache/airflow/pull/60108
lists.apache.org/thread/pk3m2z4s2rkmc0v6gh9hnch9spc6stqw