Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <bd6d78f8-5458-d3f0-9fe1-806b534dcf93@apache.org>
Date: Thu, 15 Jan 2026 20:23:55 +0000
From: Ephraim Anierobi <ephraimanierobi@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-68675: Apache Airflow: proxy credentials for various
 providers might leak in task logs 

Severity: low 

Affected versions:

- Apache Airflow (apache-airflow) before 3.1.6

Description:

In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed.

Users are recommended to upgrade to 3.1.6 or later, which fixes this issue

Credit:

lwlkr https://github.com/kwkr (finder)
Ankit Chaurasia (remediation developer)

References:

https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-68675

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.