![]() |
|
Message-ID: <CAH5JyZpcppJjVPTcuQmLJMaEaJa7CsH+dAgv1DNyQwsjR25iRw@mail.gmail.com>
Date: Thu, 25 Sep 2025 17:39:23 +0100
From: Kaxil Naik <kaxilnaik@...che.org>
To: oss-security@...ts.openwall.com, users@...flow.apache.org,
dev@...flow.apache.org
Subject: CVE-2025-54831: Apache Airflow: Connection sensitive details exposed
to users with READ permissions
CVE-2025-54831: Apache Airflow: Connection sensitive details exposed
to users with READ permissions
Severity: important
Affected versions:
- Apache Airflow (apache-airflow) 3.0.3
Description:
Apache Airflow 3 introduced a change to the handling of sensitive
information in Connections. The intent was to restrict access to
sensitive connection fields to Connection Editing Users, effectively
applying a "write-only" model for sensitive values.
In Airflow 3.0.3, this model was unintentionally violated: sensitive
connection information could be viewed by users with READ permissions
through both the API and the UI. This behavior also bypassed the
`AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS` configuration option.
This issue does not affect Airflow 2.x, where exposing sensitive
information to connection editors was the intended and documented
behavior.
Users of Airflow 3.0.3 are advised to upgrade Airflow to >=3.0.4.
References:
https://airflow.apache.org/https://www.cve.org/CVERecord?id=CVE-2025-54831
Content of type "text/html" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.