Home

Description

In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.

PUBLISHED Reserved 2026-04-28 | Published 2026-05-19 | Updated 2026-05-19 | Assigner apache

Problem types

CWE-863: Incorrect Authorization

Product status

Default status
unaffected

Any version before 9.28.0
affected

Credits

Justin Pakzad remediation developer

References

www.openwall.com/lists/oss-security/2026/05/19/36

github.com/apache/airflow/pull/65703 patch

lists.apache.org/thread/0092sz5g520d3qqjb01wd61myqlgjtyn vendor-advisory

cve.org (CVE-2026-42526)

nvd.nist.gov (CVE-2026-42526)

Download JSON