CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4DescriptionNVD
An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
AnalysisAI
Command injection in Apache Airflow's BashOperator documentation example allows authenticated attackers to escalate privileges from UI user to worker-level code execution. Affects all Airflow versions before 3.2.0. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify all Apache Airflow instances running versions before 3.2.0 and inventory DAGs using BashOperator with dag_run.conf parameter handling. Within 7 days: Upgrade all affected Airflow deployments to version 3.2.0 or later, and conduct code review of existing DAGs to identify and remediate unsafe parameter handling patterns matching the vulnerable documentation example. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-23660
GHSA-6337-2587-f2jq