CVE-2026-25917

critical

Description

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

References

https://lists.apache.org/thread/6whgpkqbh12rvpfmvcg8b0vwlv4hq3po

https://github.com/apache/airflow/pull/61641

http://www.openwall.com/lists/oss-security/2026/04/17/9

Details

Source: Mitre, NVD

Published: 2026-04-18

Updated: 2026-04-18

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical