CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Blast Radius
ecosystem impact- 21 pypi packages depend on apache-airflow (11 direct, 10 indirect)
Ecosystem-wide dependent count for version 3.1.8.
DescriptionNVD
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.
Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.
AnalysisAI
Remote code execution in Apache Airflow 3.1.x allows authenticated DAG Authors to execute arbitrary code in the webserver context through crafted XCom payloads exploiting insecure deserialization (CWE-502). Affects Apache Airflow versions 3.1.8 through <3.2.0. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: inventory all Apache Airflow 3.1.8 through 3.1.x deployments and identify DAG Author role assignments. Within 7 days: upgrade to Apache Airflow 3.2.0 or apply vendor-released patch; if immediate upgrade is not feasible, implement access controls restricting DAG Author role to essential personnel only and enable detailed audit logging of DAG creation and modification activities. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-21978
GHSA-mc4f-r875-v87w