Vulnerabilities > Apache > Airflow

DATE CVE VULNERABILITY TITLE RISK
2024-08-21 CVE-2024-41937 Unspecified vulnerability in Apache Airflow
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link.
network
low complexity
apache
6.1
2024-07-17 CVE-2024-39863 Cross-site Scripting vulnerability in Apache Airflow
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider.
network
low complexity
apache CWE-79
5.4
2024-07-17 CVE-2024-39877 Unspecified vulnerability in Apache Airflow
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model.
network
low complexity
apache
8.8
2024-06-14 CVE-2024-25142 Unspecified vulnerability in Apache Airflow
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow.  Airflow did not return "Cache-Control" header for dynamic content, which in case of some browsers could result in potentially storing sensitive data in local cache of the browser. This issue affects Apache Airflow: before 2.9.2. Users are recommended to upgrade to version 2.9.2, which fixes the issue.
local
low complexity
apache
5.5
2024-05-14 CVE-2024-32077 Unspecified vulnerability in Apache Airflow 2.9.0
Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs.  Users are recommended to upgrade to version 2.9.1, which fixes this issue.
network
low complexity
apache
5.4
2024-03-14 CVE-2024-28746 Unspecified vulnerability in Apache Airflow 2.8.0/2.8.1/2.8.2
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access.  Users of Apache Airflow are recommended to upgrade to version 2.8.3 or newer to mitigate the risk associated with this vulnerability
network
low complexity
apache
8.1
2024-01-24 CVE-2023-50943 Deserialization of Untrusted Data vulnerability in Apache Airflow
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization.
network
low complexity
apache CWE-502
7.5
2024-01-24 CVE-2023-50944 Unspecified vulnerability in Apache Airflow
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don't have access. This vulnerability is considered low since it requires an authenticated user to exploit it.
network
low complexity
apache
6.5
2024-01-24 CVE-2023-51702 Unspecified vulnerability in Apache Airflow and Airflow Cncf Kubernetes
Since version 5.2.0, when using deferrable mode with the path of a Kubernetes configuration file for authentication, the Airflow worker serializes this configuration file as a dictionary and sends it to the triggerer by storing it in metadata without any encryption.
network
low complexity
apache
6.5
2023-12-21 CVE-2023-47265 Unspecified vulnerability in Apache Airflow
Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a DAG author to add an unbounded and not-sanitized javascript in the parameter description field of the DAG. This Javascript can be executed on the client side of any of the user who looks at the tasks in the browser sandbox.
network
low complexity
apache
5.4