CVE-2026-24098

6.5 MEDIUM

📋 TL;DR

This CVE describes an information disclosure vulnerability in Apache Airflow where authenticated users with access to specific DAGs can view import errors from other DAGs they shouldn't have access to. This affects all Apache Airflow deployments with multiple users and DAG-level permissions. The vulnerability allows unauthorized access to potentially sensitive error information.

💻 Affected Systems

Products:
  • Apache Airflow
Versions: All versions before 3.1.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with multiple users and DAG-level permission configurations. Single-user deployments or deployments without DAG-level permissions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could gather intelligence about other DAGs' configurations, dependencies, and potential weaknesses by analyzing import errors, potentially enabling further attacks or business intelligence gathering.

🟠

Likely Case

Users accidentally or intentionally viewing error details from DAGs they shouldn't access, potentially exposing sensitive information about other workflows, dependencies, or system configurations.

🟢

If Mitigated

With proper network segmentation and minimal user permissions, impact is limited to viewing error messages from other DAGs within the same Airflow instance.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Airflow UI with permissions to at least one DAG. The vulnerability is straightforward to exploit by navigating to error views.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.7 or later

Vendor Advisory: https://lists.apache.org/thread/nx96435v77xdst7ls5lk57kqvqyj095x

Restart Required: Yes

Instructions:

1. Backup your Airflow deployment and database. 2. Upgrade Apache Airflow to version 3.1.7 or later using pip: 'pip install --upgrade apache-airflow==3.1.7'. 3. Restart all Airflow components (webserver, scheduler, workers). 4. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict UI Access

all

Limit Airflow UI access to only trusted administrators until patching can be completed.

Configure firewall rules to restrict access to Airflow webserver port (default 8080)
Use network policies to limit UI access to specific IP ranges

Minimize User Permissions

all

Reduce the number of users with DAG access permissions to minimize potential exposure.

Review and tighten Airflow RBAC permissions
Remove unnecessary user accounts from DAG access groups

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Airflow instances and limit user access
  • Enable detailed audit logging for all DAG access and error viewing activities

🔍 How to Verify

Check if Vulnerable:

Check your Apache Airflow version. If it's below 3.1.7 and you have multiple users with DAG-level permissions, you are vulnerable.

Check Version:

airflow version

Verify Fix Applied:

After upgrading to 3.1.7 or later, test that users with access to specific DAGs cannot view import errors from other DAGs they don't have permissions for.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of error log access from users
  • Multiple error view requests from single user across different DAGs

Network Indicators:

  • Increased traffic to error viewing endpoints from non-admin users

SIEM Query:

source="airflow" AND (event="view_import_errors" OR event="error_log_access") AND user!="admin" AND dag_count>1

🔗 References

📤 Share & Export