Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <70e68108-a8b7-d0ea-8735-f6c2f7ae0aca@apache.org>
Date: Tue, 19 May 2026 18:06:00 +0000
From: Vincent Beck <vincbeck@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-27173: Apache Airflow CNCF Kubernetes provider: JWT Token
 Exposure in KubernetesExecutor Command-Line Arguments 

Severity: Moderate 

Affected versions:

- Apache Airflow CNCF Kubernetes provider (apache-airflow-providers-cncf-kubernetes) before 10.17.0

Description:

JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.

Credit:

Nikolai Dvoinishnikov, Welltory (finder)
Anton Kuznetsov, Welltory (finder)
Anish Giri (remediation developer)

References:

https://github.com/apache/airflow/pull/60108
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-27173

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.