Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65995: CWE-209 Generation of Error Message Containing Sensitive Information in Apache Software Foundation Apache Airflow

0
Medium
VulnerabilityCVE-2025-65995cvecve-2025-65995cwe-209
Published: Sat Feb 21 2026 (02/21/2026, 02:14:25 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Airflow

Description

When a DAG failed during parsing, Airflow’s error-reporting in the UI could include the full kwargs passed to the operators. If those kwargs contained sensitive values (such as secrets), they might be exposed in the UI tracebacks to authenticated users who had permission to view that DAG.  The issue has been fixed in Airflow 3.1.4 and 2.11.1, and users are strongly advised to upgrade to prevent potential disclosure of sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 00:41:34 UTC

Technical Analysis

CVE-2025-65995 is a vulnerability classified under CWE-209 (Generation of Error Message Containing Sensitive Information) affecting Apache Airflow, an open-source platform used for programmatically authoring, scheduling, and monitoring workflows (DAGs). When a DAG fails during parsing, Airflow’s error reporting mechanism in the UI would display the full keyword arguments (kwargs) passed to operators involved in the DAG. These kwargs could contain sensitive information such as passwords, API keys, or other secrets. Because the error tracebacks are visible to authenticated users who have permission to view the DAG, this leads to unintended exposure of confidential data. The vulnerability affects Airflow versions 3.0.0 and earlier, specifically fixed in versions 3.1.4 and 2.11.1. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user with DAG view rights), no user interaction, and high impact on confidentiality but no impact on integrity or availability. No known exploits have been reported in the wild. The root cause is insufficient sanitization or filtering of sensitive data in error messages displayed in the UI, violating secure error handling best practices.

Potential Impact

The primary impact of this vulnerability is the potential disclosure of sensitive information such as secrets, credentials, or configuration parameters embedded in DAG operator kwargs. This can lead to unauthorized access to critical systems or data if attackers or unauthorized insiders gain access to these secrets. Since the vulnerability requires authenticated access with DAG view permissions, the risk is limited to users who already have some level of access to the Airflow environment. However, in environments where many users have DAG viewing rights or where Airflow is exposed to a large user base, the risk of sensitive data leakage increases. This could facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical in environments handling sensitive workflows and data pipelines.

Mitigation Recommendations

Organizations should upgrade Apache Airflow to version 3.1.4 or 2.11.1 or later where this vulnerability is fixed. Until upgrading, administrators should audit and minimize the exposure of sensitive information in DAG kwargs, avoiding embedding secrets directly in operator parameters. Implement strict access controls to limit DAG viewing permissions only to trusted users. Additionally, consider enabling logging and monitoring to detect unusual access patterns to Airflow UI error pages. Employ secret management solutions external to Airflow to avoid hardcoding secrets in DAG definitions. Review and sanitize error reporting configurations to ensure sensitive data is not exposed in logs or UI. Regularly review Airflow configurations and user permissions to reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-11-18T21:39:26.985Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699923b9be58cf853b17289f

Added to database: 2/21/2026, 3:17:13 AM

Last enriched: 3/9/2026, 12:41:34 AM

Last updated: 4/7/2026, 1:36:59 PM

Views: 144

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses