CVE-2025-27555: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Airflow
Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378
AI Analysis
Technical Summary
CVE-2025-27555 is a security vulnerability classified under CWE-532, which involves the insertion of sensitive information into log files. Specifically, in Apache Airflow versions before 2.11.1, when users set sensitive connection parameters using the Airflow CLI, these sensitive values were inadvertently recorded in audit logs in plaintext. These logs are stored unencrypted in the Airflow metadata database, making sensitive credentials accessible to any authenticated user with permissions to view audit logs. The vulnerability arises because audit logging does not sanitize or mask sensitive parameters before logging, leading to exposure of secrets such as passwords or API keys. The attack vector requires an authenticated user with audit log access, so it is not remotely exploitable by unauthenticated attackers. The vulnerability does not impact system integrity or availability but compromises confidentiality of sensitive connection data. The issue is similar to but distinct from CVE-2024-50378. The Apache Software Foundation addressed this vulnerability in Airflow version 2.11.1 by preventing sensitive parameters from being logged. Users who previously set connections via CLI should manually purge sensitive entries from the log tables to prevent residual exposure. No public exploits have been reported, but the risk remains for insider threats or compromised accounts with audit log access.
Potential Impact
The primary impact of CVE-2025-27555 is the unauthorized disclosure of sensitive connection credentials stored in audit logs. This can lead to credential compromise if an attacker or malicious insider gains audit log access, potentially enabling further unauthorized access to connected systems or data sources. Although exploitation requires authenticated access with audit log permissions, organizations with multiple users or insufficient access controls are at risk of insider threats or lateral movement. The vulnerability does not affect system integrity or availability, but the confidentiality breach can have cascading effects, including data exfiltration or privilege escalation if credentials are reused elsewhere. Organizations relying heavily on Airflow for orchestration of critical workflows and integrations may face increased risk if sensitive connection parameters are exposed. The lack of encryption in stored logs exacerbates the risk. The medium CVSS score reflects the moderate ease of exploitation within a limited scope but significant confidentiality impact.
Mitigation Recommendations
Organizations should upgrade Apache Airflow to version 2.11.1 or later immediately to eliminate the vulnerability. Until upgrade, restrict audit log access strictly to trusted administrators and enforce the principle of least privilege to minimize exposure. Review and audit current audit log entries for sensitive connection parameters set via CLI and manually delete or sanitize these entries from the Airflow metadata database to remove residual sensitive data. Implement monitoring and alerting on audit log access to detect unusual or unauthorized access patterns. Consider encrypting the Airflow metadata database or audit logs at rest to reduce risk of data leakage. Educate users and administrators about the risks of setting sensitive parameters via CLI and encourage use of environment variables or secret management tools integrated with Airflow. Regularly review and rotate credentials used in Airflow connections to limit the impact of potential exposure. Finally, maintain up-to-date backups of sanitized logs and configurations to support incident response.
Affected Countries
United States, Germany, United Kingdom, France, India, Japan, Canada, Australia, Netherlands, Brazil
CVE-2025-27555: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Airflow
Description
Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-27555 is a security vulnerability classified under CWE-532, which involves the insertion of sensitive information into log files. Specifically, in Apache Airflow versions before 2.11.1, when users set sensitive connection parameters using the Airflow CLI, these sensitive values were inadvertently recorded in audit logs in plaintext. These logs are stored unencrypted in the Airflow metadata database, making sensitive credentials accessible to any authenticated user with permissions to view audit logs. The vulnerability arises because audit logging does not sanitize or mask sensitive parameters before logging, leading to exposure of secrets such as passwords or API keys. The attack vector requires an authenticated user with audit log access, so it is not remotely exploitable by unauthenticated attackers. The vulnerability does not impact system integrity or availability but compromises confidentiality of sensitive connection data. The issue is similar to but distinct from CVE-2024-50378. The Apache Software Foundation addressed this vulnerability in Airflow version 2.11.1 by preventing sensitive parameters from being logged. Users who previously set connections via CLI should manually purge sensitive entries from the log tables to prevent residual exposure. No public exploits have been reported, but the risk remains for insider threats or compromised accounts with audit log access.
Potential Impact
The primary impact of CVE-2025-27555 is the unauthorized disclosure of sensitive connection credentials stored in audit logs. This can lead to credential compromise if an attacker or malicious insider gains audit log access, potentially enabling further unauthorized access to connected systems or data sources. Although exploitation requires authenticated access with audit log permissions, organizations with multiple users or insufficient access controls are at risk of insider threats or lateral movement. The vulnerability does not affect system integrity or availability, but the confidentiality breach can have cascading effects, including data exfiltration or privilege escalation if credentials are reused elsewhere. Organizations relying heavily on Airflow for orchestration of critical workflows and integrations may face increased risk if sensitive connection parameters are exposed. The lack of encryption in stored logs exacerbates the risk. The medium CVSS score reflects the moderate ease of exploitation within a limited scope but significant confidentiality impact.
Mitigation Recommendations
Organizations should upgrade Apache Airflow to version 2.11.1 or later immediately to eliminate the vulnerability. Until upgrade, restrict audit log access strictly to trusted administrators and enforce the principle of least privilege to minimize exposure. Review and audit current audit log entries for sensitive connection parameters set via CLI and manually delete or sanitize these entries from the Airflow metadata database to remove residual sensitive data. Implement monitoring and alerting on audit log access to detect unusual or unauthorized access patterns. Consider encrypting the Airflow metadata database or audit logs at rest to reduce risk of data leakage. Educate users and administrators about the risks of setting sensitive parameters via CLI and encourage use of environment variables or secret management tools integrated with Airflow. Regularly review and rotate credentials used in Airflow connections to limit the impact of potential exposure. Finally, maintain up-to-date backups of sanitized logs and configurations to support incident response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-03-01T16:50:26.767Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 699d7ab4be58cf853bad4712
Added to database: 2/24/2026, 10:17:24 AM
Last enriched: 3/11/2026, 6:57:19 PM
Last updated: 4/9/2026, 5:23:32 PM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.