Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <984cd814-8f9a-8525-7d5a-876bf3edb14d@apache.org>
Date: Sun, 08 Mar 2026 19:09:35 +0000
From: Jarek Potiuk <potiuk@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-69219: Apache Airflow Providers Http: Unsafe Pickle
 Deserialization in apache-airflow-providers-http leading to RCE via
 HttpOperator 

Severity: Low 

Affected versions:

- Apache Airflow Providers Http (apache-airflow-providers-http) 5.1.0 before 6.0.0

Description:

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.

You should upgrade to version 6.0.0 of the provider to avoid even that risk.

Credit:

skypher (finder)
Shauryae1337 (GitHub: https://github.com/Shauryae1337) (finder)
Ahmet Artuç (finder)

References:

https://github.com/apache/airflow/pull/61662
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-69219

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.