Skip to main content
Mallory

Apache Airflow Flaws Enable Security Bypass and Multiple Additional Vulnerabilities

widely-deployed-product-advisoryopen-source-dependency-vulnerabilityidentity-authentication-vulnerability
Updated April 27, 2026 at 12:01 PM8 sources
Share:
Apache Airflow Flaws Enable Security Bypass and Multiple Additional Vulnerabilities

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

German authorities issued advisories for Apache Airflow covering a vulnerability that can bypass security measures and a separate notice for multiple vulnerabilities affecting the workflow orchestration platform. The alerts indicate that Airflow deployments may be exposed to weaknesses that undermine intended protections and introduce additional security risk across affected environments.

Organizations using Apache Airflow should review the referenced advisories, identify affected versions, and prioritize vendor-recommended updates or mitigations. Because Airflow is commonly used to manage automated data pipelines and scheduled jobs, successful exploitation could weaken access controls or expose connected systems and workflows to further compromise.

Timeline

  1. Apr 27, 2026

    dCERT publishes Apache Airflow multiple vulnerabilities advisory 2026-1254

    dCERT published advisory 2026-1254 for Apache Airflow, disclosing multiple vulnerabilities that could allow information disclosure. This is a new advisory separate from the previously listed Apache Airflow disclosures.

  2. Apr 20, 2026

    dCERT publishes Apache Airflow and Keycloak Provider advisory 2026-1146

    dCERT published advisory 2026-1146 covering multiple vulnerabilities affecting Apache Airflow and the Apache Airflow Keycloak Provider. This is a new advisory separate from the previously listed Apache Airflow disclosures.

  3. Apr 17, 2026

    dCERT publishes Apache Airflow information disclosure advisory 2026-1137

    dCERT published advisory 2026-1137 for Apache Airflow, disclosing a vulnerability that could allow information disclosure. This is a new advisory separate from the previously listed Apache Airflow disclosures.

  4. Apr 16, 2026

    dCERT publishes Apache Airflow information disclosure advisory 2026-1126

    dCERT published advisory 2026-1126 for Apache Airflow, disclosing a vulnerability that could allow information disclosure. This is a new advisory separate from earlier Apache Airflow vulnerability disclosures.

  5. Apr 15, 2026

    dCERT publishes Apache Airflow code execution advisory 2026-1101

    dCERT published advisory 2026-1101 for Apache Airflow, disclosing a vulnerability that could allow code execution. This is a new advisory separate from the previously listed Apache Airflow disclosures.

  6. Apr 14, 2026

    dCERT publishes Apache Airflow multiple vulnerabilities advisory 2026-1052

    dCERT published advisory 2026-1052 for Apache Airflow, disclosing multiple vulnerabilities affecting the platform. This represents a new advisory separate from earlier Apache Airflow disclosures.

  7. Apr 10, 2026

    dCERT publishes Apache Airflow multiple vulnerabilities advisory 2026-1021

    dCERT published advisory 2026-1021 covering multiple vulnerabilities affecting Apache Airflow, indicating additional or broader security issues were disclosed.

  8. Mar 31, 2026

    dCERT publishes Apache Airflow security bypass advisory 2026-0896

    dCERT published advisory 2026-0896 for Apache Airflow, stating that a vulnerability could allow bypassing security measures.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Affected Products

Related Stories

Apache Airflow 3.0.x Exposed JWTs Through Logout and Logging Flaws

Apache Airflow 3.0.x Exposed JWTs Through Logout and Logging Flaws

Apache disclosed two JWT-related vulnerabilities in Apache Airflow affecting versions `3.0.0` before `3.2.0`. The first, `CVE-2025-57735`, is a low-severity flaw in which logout did not invalidate authentication JWTs, leaving intercepted tokens usable after a user signed out. The second, `CVE-2026-31987`, is a moderate-severity issue that caused task JWTs to appear in logs, potentially exposing credentials to users who could then act as DAG authors. Apache said both issues are fixed in Airflow `3.2.0`, which adds token invalidation on logout and removes the logging exposure. Organizations running affected releases have been advised to upgrade to `3.2.0` or later, particularly where shared log access or concerns about token reuse could increase the risk of unauthorized access and privilege escalation.

2 weeks ago
Apache Airflow fixes XCom-related code execution flaws in deserialization and example DAGs

Apache Airflow fixes XCom-related code execution flaws in deserialization and example DAGs

Apache disclosed two low-severity code execution issues in **Apache Airflow** tied to its XCom mechanism and addressed them in **Airflow 3.2.0**. **CVE-2026-33858** affects Airflow versions `3.1.8` before `3.2.0` and stems from unsafe deserialization in the XCom API, where legacy serialization keys `__type` and `__var` can bypass protections and let a DAG author craft payloads that execute arbitrary code in the webserver context. Apache said the flaw was rated low severity because DAG authors are already treated as highly trusted users. Apache also disclosed **CVE-2025-54550**, a low-severity remote code execution issue involving the documented `example_xcom` DAG pattern. The vulnerable pattern read XCom values in a way that could allow a UI user with permission to modify XComs to trigger arbitrary code execution on a worker through a race condition. Apache said official releases were not directly affected because example DAGs are not meant to be enabled in production, but organizations that copied the documented approach could reproduce the weakness in their own deployments; updated documentation in **Airflow 3.2.0** provides a safer example.

2 weeks ago
Apache ActiveMQ and Artemis Flaws Enable Security Bypass and Multiple Attacks

Apache ActiveMQ and Artemis Flaws Enable Security Bypass and Multiple Attacks

German authorities issued advisories for **Apache ActiveMQ Artemis** and **Apache ActiveMQ Classic** components after disclosing vulnerabilities that affect the broker, client, and web interfaces. One advisory warns that a flaw in **Apache ActiveMQ Artemis** can allow attackers to **bypass security measures**, raising the risk of unauthorized access or actions within affected messaging environments. A separate advisory reports **multiple vulnerabilities** in **Apache ActiveMQ** across the **Client, Broker, and Web** components, indicating broader exposure for organizations using the messaging platform in enterprise integrations and application back ends. The notices identify the affected Apache messaging products as requiring prompt review and remediation to reduce the risk of compromise in systems that rely on ActiveMQ services.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Apache Airflow Flaws Enable Security Bypass and Multiple Additional Vulnerabilities | Mallory