Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <a50ba779-d385-b8f1-7304-ba2b38dcec02@apache.org>
Date: Tue, 17 Mar 2026 06:25:54 +0000
From: Rahul Vats <rahulvats@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-28563: Apache Airflow: DAG authorization bypass 

Severity: low 

Affected versions:

- Apache Airflow (apache-airflow) 3.0.0 before 3.1.8

Description:

Apache Airflow versions 3.1.0 through 3.1.7 /ui/dependencies endpoint returns the full DAG dependency graph without filtering by authorized DAG IDs. This allows an authenticated user with only DAG Dependencies permission to enumerate DAGs they are not authorized to view.


Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

Credit:

Masamune - Unit515 OPSWAT (finder)
Shubham Raj (remediation developer)

References:

https://github.com/apache/airflow/pull/62046
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-28563

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.