CVE-2025-67895: CWE-669: Incorrect Resource Transfer Between Spheres in Apache Software Foundation Apache Airflow Providers Edge3
Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.
AI Analysis
Technical Summary
CVE-2025-67895 is a critical vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) affecting the Apache Airflow Providers Edge3 integration when deployed on Apache Airflow version 2. The Edge3 provider prior to version 2.0.0 was intended only for development and testing purposes and was never officially released for production use on Airflow 2. However, if installed and configured on Airflow 2, it implicitly enabled a non-public API that was designed for internal testing. This API allows DAG authors—users who define Directed Acyclic Graphs for workflow orchestration—to perform remote code execution (RCE) within the webserver context. This is a significant breach of the intended security model, as DAG authors should not have the capability to execute arbitrary code on the server hosting Airflow. The vulnerability does not affect Airflow 3 or Edge3 provider versions 2.0.0 and later, as these versions remove the vulnerable code and require Airflow 3 as a minimum version. The CVSS v3.1 score of 9.8 indicates that the vulnerability is remotely exploitable without authentication or user interaction, with a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a critical threat. The recommended remediation is to uninstall the Edge3 provider from Airflow 2 and migrate to Airflow 3 with the updated Edge3 provider version 2.0.0 or later, which eliminates the vulnerable code paths.
Potential Impact
The impact of CVE-2025-67895 on European organizations can be severe, especially for those relying on Apache Airflow 2 with the Edge3 provider for workflow automation and data pipeline orchestration. Successful exploitation allows an attacker with DAG author privileges to execute arbitrary code on the Airflow webserver, potentially leading to full system compromise, data exfiltration, disruption of critical workflows, and lateral movement within the network. This can affect confidentiality by exposing sensitive data processed by Airflow, integrity by altering workflows or injecting malicious tasks, and availability by disrupting or halting automated processes. Given that Airflow is widely used in industries such as finance, telecommunications, manufacturing, and public sector organizations across Europe, the vulnerability poses a significant risk to operational continuity and data security. The lack of authentication or user interaction requirements for exploitation increases the threat level, making it easier for malicious insiders or compromised accounts to leverage this flaw. Additionally, the vulnerability could be exploited to deploy ransomware or other malware, amplifying the potential damage. Organizations that have not upgraded to Airflow 3 or removed the vulnerable Edge3 provider are at heightened risk.
Mitigation Recommendations
To mitigate CVE-2025-67895, European organizations should take immediate and specific actions beyond generic patching advice: 1) Identify all instances of Apache Airflow 2 deployments with the Edge3 provider installed. 2) Uninstall the Edge3 provider from Airflow 2 environments as it contains the vulnerable non-public API. 3) Plan and execute a migration to Apache Airflow 3, ensuring that the Edge3 provider version is upgraded to 2.0.0 or later, which removes the vulnerable code. 4) Restrict DAG author privileges to trusted personnel only, minimizing the risk of insider exploitation. 5) Implement network segmentation and access controls to limit exposure of the Airflow webserver to untrusted networks. 6) Monitor Airflow logs and system behavior for unusual activity indicative of exploitation attempts. 7) Conduct security audits and code reviews of DAGs to detect potentially malicious or unauthorized code. 8) Stay updated with Apache Airflow security advisories and apply future patches promptly. These targeted steps will reduce the attack surface and prevent exploitation of this critical vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Switzerland
CVE-2025-67895: CWE-669: Incorrect Resource Transfer Between Spheres in Apache Software Foundation Apache Airflow Providers Edge3
Description
Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-67895 is a critical vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) affecting the Apache Airflow Providers Edge3 integration when deployed on Apache Airflow version 2. The Edge3 provider prior to version 2.0.0 was intended only for development and testing purposes and was never officially released for production use on Airflow 2. However, if installed and configured on Airflow 2, it implicitly enabled a non-public API that was designed for internal testing. This API allows DAG authors—users who define Directed Acyclic Graphs for workflow orchestration—to perform remote code execution (RCE) within the webserver context. This is a significant breach of the intended security model, as DAG authors should not have the capability to execute arbitrary code on the server hosting Airflow. The vulnerability does not affect Airflow 3 or Edge3 provider versions 2.0.0 and later, as these versions remove the vulnerable code and require Airflow 3 as a minimum version. The CVSS v3.1 score of 9.8 indicates that the vulnerability is remotely exploitable without authentication or user interaction, with a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a critical threat. The recommended remediation is to uninstall the Edge3 provider from Airflow 2 and migrate to Airflow 3 with the updated Edge3 provider version 2.0.0 or later, which eliminates the vulnerable code paths.
Potential Impact
The impact of CVE-2025-67895 on European organizations can be severe, especially for those relying on Apache Airflow 2 with the Edge3 provider for workflow automation and data pipeline orchestration. Successful exploitation allows an attacker with DAG author privileges to execute arbitrary code on the Airflow webserver, potentially leading to full system compromise, data exfiltration, disruption of critical workflows, and lateral movement within the network. This can affect confidentiality by exposing sensitive data processed by Airflow, integrity by altering workflows or injecting malicious tasks, and availability by disrupting or halting automated processes. Given that Airflow is widely used in industries such as finance, telecommunications, manufacturing, and public sector organizations across Europe, the vulnerability poses a significant risk to operational continuity and data security. The lack of authentication or user interaction requirements for exploitation increases the threat level, making it easier for malicious insiders or compromised accounts to leverage this flaw. Additionally, the vulnerability could be exploited to deploy ransomware or other malware, amplifying the potential damage. Organizations that have not upgraded to Airflow 3 or removed the vulnerable Edge3 provider are at heightened risk.
Mitigation Recommendations
To mitigate CVE-2025-67895, European organizations should take immediate and specific actions beyond generic patching advice: 1) Identify all instances of Apache Airflow 2 deployments with the Edge3 provider installed. 2) Uninstall the Edge3 provider from Airflow 2 environments as it contains the vulnerable non-public API. 3) Plan and execute a migration to Apache Airflow 3, ensuring that the Edge3 provider version is upgraded to 2.0.0 or later, which removes the vulnerable code. 4) Restrict DAG author privileges to trusted personnel only, minimizing the risk of insider exploitation. 5) Implement network segmentation and access controls to limit exposure of the Airflow webserver to untrusted networks. 6) Monitor Airflow logs and system behavior for unusual activity indicative of exploitation attempts. 7) Conduct security audits and code reviews of DAGs to detect potentially malicious or unauthorized code. 8) Stay updated with Apache Airflow security advisories and apply future patches promptly. These targeted steps will reduce the attack surface and prevent exploitation of this critical vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-12-13T16:52:31.830Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942998e034dcf4950468cea
Added to database: 12/17/2025, 11:52:46 AM
Last enriched: 12/24/2025, 12:00:25 PM
Last updated: 2/7/2026, 12:23:37 PM
Views: 228
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.