Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56373: CWE-94: Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache Airflow

0
High
VulnerabilityCVE-2024-56373cvecve-2024-56373cwe-94
Published: Tue Feb 24 2026 (02/24/2026, 10:06:41 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Airflow

Description

DAG Author (who already has quite a lot of permissions) could manipulate database of Airflow 2 in the way to execute arbitrary code in the web-server context, which they should normally not be able to do, leading to potentially remote code execution in the context of web-server (server-side) as a result of a user viewing historical task information. The functionality responsible for that (log template history) has been disabled by default in 2.11.1 and users should upgrade to Airflow 3 if they want to continue to use log template history. They can also manually modify historical log file names if they want to see historical logs that were generated before the last log template change.

AI-Powered Analysis

AILast updated: 02/24/2026, 10:32:06 UTC

Technical Analysis

CVE-2024-56373 is a critical code injection vulnerability (CWE-94) found in Apache Airflow, an open-source platform widely used for orchestrating complex workflows. The flaw arises from improper control over code generation within the log template history feature. Specifically, a DAG author—who already possesses significant permissions within Airflow—can manipulate the Airflow database to inject arbitrary code that executes in the context of the Airflow web server. This occurs when a user views historical task logs, triggering execution of malicious code embedded via the log template mechanism. The vulnerability effectively allows remote code execution (RCE) on the server hosting Airflow, which could lead to full system compromise. To mitigate this, the vulnerable feature has been disabled by default starting with Airflow version 2.11.1. Users wishing to retain log template history functionality are advised to upgrade to Airflow 3, which presumably addresses the vulnerability securely. Alternatively, users can manually adjust historical log file names to access logs generated before the log template change. No public exploits have been reported yet, but the vulnerability’s nature and potential impact warrant urgent attention. The flaw highlights the risk of granting DAG authors extensive permissions without sufficient safeguards against code injection attacks in workflow orchestration platforms.

Potential Impact

The impact of CVE-2024-56373 is significant for organizations using Apache Airflow versions prior to 2.11.1 that have enabled the log template history feature. Successful exploitation allows a DAG author to execute arbitrary code on the Airflow web server, potentially leading to full system compromise, data theft, or lateral movement within the network. Since Airflow is often deployed in critical data pipelines and automation workflows, such a compromise could disrupt business operations, corrupt data processing, or expose sensitive information. The requirement that the attacker already has DAG author permissions limits the attack surface but does not eliminate risk, especially in large organizations where multiple users may have such roles. The vulnerability could also be leveraged by insiders or attackers who have gained DAG author credentials. Given Airflow’s widespread adoption in industries like finance, technology, healthcare, and cloud services, the threat could affect a broad range of enterprises globally. The absence of known exploits in the wild provides a window for proactive mitigation, but the potential for severe damage makes timely patching and access control critical.

Mitigation Recommendations

To mitigate CVE-2024-56373, organizations should: 1) Upgrade Apache Airflow to version 2.11.1 or later, where the vulnerable log template history feature is disabled by default, or preferably to Airflow 3, which supports secure use of this feature. 2) Restrict DAG author permissions strictly to trusted personnel and regularly audit these permissions to minimize the risk of insider threats or credential compromise. 3) Disable the log template history feature if upgrading is not immediately possible, to prevent exploitation via historical log viewing. 4) Implement network segmentation and least privilege principles around Airflow servers to limit the impact of any potential compromise. 5) Monitor Airflow logs and database changes for unusual activity indicative of attempted code injection or privilege misuse. 6) Educate users with DAG author roles about the risks and encourage secure coding practices within DAG definitions. 7) Consider additional application-layer protections such as Web Application Firewalls (WAFs) to detect anomalous requests targeting Airflow’s web interface. These steps go beyond generic advice by focusing on permission management, feature control, and operational monitoring specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2024-12-22T12:06:12.879Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699d7ab4be58cf853bad470e

Added to database: 2/24/2026, 10:17:24 AM

Last enriched: 2/24/2026, 10:32:06 AM

Last updated: 2/24/2026, 10:49:49 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats