EUVD-2025-19239

| CVE-2025-50213 CRITICAL
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19239
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
Patch Released
Mar 15, 2026 - 22:36 nvd
Patch available
CVE Published
Jun 24, 2025 - 08:15 nvd
CRITICAL 9.8

Description

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) vulnerability in Apache Airflow Providers Snowflake. This issue affects Apache Airflow Providers Snowflake: before 6.4.0. Sanitation of table and stage parameters were added in CopyFromExternalStageToSnowflakeOperator to prevent SQL injection Users are recommended to upgrade to version 6.4.0, which fixes the issue.

Analysis

Apache Airflow Providers Snowflake versions before 6.4.0 contain a Special Element Injection vulnerability (CWE-75) in the CopyFromExternalStageToSnowflakeOperator that fails to properly sanitize table and stage parameters, allowing unauthenticated attackers to execute arbitrary SQL injection attacks with complete system compromise (CVSS 9.8). This is a critical remote vulnerability requiring network access only, with no authentication or user interaction needed, making it a high-priority patch regardless of KEV/EPSS status.

Technical Context

The vulnerability exists in Apache Airflow Providers Snowflake (CPE: pkg:pypi/apache-airflow-providers-snowflake), specifically in the CopyFromExternalStageToSnowflakeOperator class. The root cause is CWE-75 (Failure to Sanitize Special Elements into a Different Plane), which occurs when user-controlled input (table and stage parameters) is concatenated directly into SQL COPY commands without proper parameterization or escaping. Airflow's Snowflake provider constructs dynamic SQL statements for data pipeline operations, and the operator failed to implement input validation before passing these parameters to the Snowflake database connector. The fix involves adding parameterized query handling and special character sanitization to prevent the injection of SQL metacharacters that could alter query logic.

Affected Products

Apache Airflow Providers Snowflake (All versions before 6.4.0)

Remediation

Upgrade to apache-airflow-providers-snowflake version 6.4.0 or later; command: pip install --upgrade apache-airflow-providers-snowflake>=6.4.0; priority: Immediate (within 24-48 hours) Workaround (if immediate patching unavailable): Restrict access to Airflow DAG/API endpoints; implement network segmentation to limit who can trigger CopyFromExternalStageToSnowflakeOperator tasks; audit existing DAGs for user-controlled table/stage parameters; priority: Temporary mitigation only Input Validation (code-level mitigation if patch cannot be applied): Validate table and stage parameter names against whitelists (e.g., alphanumeric + underscore only); avoid dynamic SQL construction without parameterized queries; priority: Secondary defense layer Post-Remediation: Review Airflow logs and Snowflake audit logs for suspicious COPY commands or SQL statements executed between deployment and patching; check for unauthorized schema/table modifications or data exports; priority: High

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +49
POC: 0

Share

EUVD-2025-19239 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy