CVE-2026-25219
MediumVulnerability Description
The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidentaly logged to logs, those values could be seen in the logs. Azure Service Bus used those properties to store sensitive values. Possibly other providers could be also affected if they used the same fields to store sensitive data.
If you used Azure Service Bus connection with those values set or if you have other connections with those values storing sensitve values, you should upgrade Airflow to 3.1.8
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Known Affected Software
111 configuration(s) from 1 vendor(s)
cpe:2.3:a:apache:airflow:1.10.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.10.2:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.5:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.8.4:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.3:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.10.4:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.6:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.3:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.10.3:rc2:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.1:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.2:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.8.3:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.5:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.9.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.6:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.1.4:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.1.4:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.4:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.10.1:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.6.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.9.3:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.10.5:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.9.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.9.2:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.9.1:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.10.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:3.0.1:-:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:1.6.2:*:*:*:*:*:*:*
References & Resources
-
https://github.com/apache/airflow/pull/61580security@apache.org Issue Tracking
-
https://github.com/apache/airflow/pull/61582security@apache.org Issue Tracking
-
https://lists.apache.org/thread/t4dlmqkn0njz4chk3g7mdgzb96y4ttqhsecurity@apache.org Mailing List Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2026/04/15/3af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
Severity Details
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor
- Description
- The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- Abstraction Level
- Class
Key Information
- Published Date
- April 15, 2026
