CVE-2025-69219

HIGH
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:56 vuln.today
Patch Released
Mar 10, 2026 - 18:58 nvd
Patch available
CVE Published
Mar 09, 2026 - 11:16 nvd
HIGH 8.8

Description

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk.

Analysis

Airflow Providers Http is affected by improper control of dynamically-managed code resources (CVSS 8.8).

Technical Context

This vulnerability (CWE-913: Improper Control of Dynamically-Managed Code Resources) affects Airflow Providers Http. A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.

You should upgrade to version 6.0.0 of the provider to avoid even that risk.

Affected Products

Vendor: Apache. Product: Airflow Providers Http.

Remediation

A vendor patch is available — apply it immediately. Update to version 6.0.0 or later. Restrict network access to the affected service where possible.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

CVE-2025-69219 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy