Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67895: CWE-669: Incorrect Resource Transfer Between Spheres in Apache Software Foundation Apache Airflow Providers Edge3

0
Unknown
VulnerabilityCVE-2025-67895cvecve-2025-67895cwe-669
Published: Wed Dec 17 2025 (12/17/2025, 11:47:42 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Airflow Providers Edge3

Description

Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.

AI-Powered Analysis

AILast updated: 12/17/2025, 11:59:30 UTC

Technical Analysis

CVE-2025-67895 is a critical vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) affecting the Apache Airflow Providers Edge3 component when deployed on Apache Airflow version 2. The Edge3 provider prior to version 2.0.0 was in a development-only state and not officially released for production use with Airflow 2. However, if installed and configured, it implicitly enabled a non-public API originally intended for testing the Edge3 provider during development. This API allowed DAG authors—users who define Directed Acyclic Graphs for workflow orchestration—to perform remote code execution (RCE) within the Airflow webserver context. This is a significant security flaw because DAG authors typically have limited permissions and should not be able to execute arbitrary code on the Airflow server. The vulnerability arises from improper separation of privileges and resource boundaries, allowing escalation of execution privileges beyond intended scopes. The Edge3 provider version 2.0.0 and later require Airflow 3 and have removed the vulnerable code paths, eliminating this attack vector. No public exploits have been reported yet, but the potential impact is severe given the nature of Airflow as a workflow orchestration platform often integrated with critical data pipelines and infrastructure. The recommended remediation is to uninstall the Edge3 provider from Airflow 2 environments and upgrade to Airflow 3 with the updated Edge3 provider version 2.0.0 or later. This vulnerability highlights the risks of using development-only components in production and the importance of strict API exposure controls.

Potential Impact

For European organizations, this vulnerability could have significant consequences, especially for those relying on Apache Airflow 2 with the Edge3 provider for orchestrating critical data workflows, ETL processes, or infrastructure automation. Successful exploitation allows a DAG author to execute arbitrary code on the Airflow webserver, potentially leading to full system compromise, data exfiltration, unauthorized access to sensitive information, and disruption of business-critical workflows. This could impact confidentiality, integrity, and availability of data and services. Organizations in sectors such as finance, healthcare, manufacturing, and telecommunications—where Airflow is commonly used for data processing and automation—are at particular risk. The ability to execute code remotely without elevated privileges or user interaction increases the attack surface and lowers the barrier for exploitation by insider threats or compromised DAG authors. Additionally, compromised Airflow instances could be leveraged as pivot points for lateral movement within enterprise networks. Given the lack of known exploits in the wild, the immediate risk may be moderate, but the potential impact of a successful attack is high.

Mitigation Recommendations

1. Immediately identify and uninstall the Edge3 provider from any Apache Airflow 2 deployments. 2. Upgrade Apache Airflow to version 3 and deploy Edge3 provider version 2.0.0 or later, which removes the vulnerable code and requires Airflow 3. 3. Review and restrict DAG author permissions to the minimum necessary, ensuring that only trusted users can create or modify DAGs. 4. Implement network segmentation and access controls to limit exposure of the Airflow webserver to trusted networks and users. 5. Monitor Airflow logs and audit trails for unusual activity, especially unexpected DAG executions or API calls. 6. Conduct a thorough security review of any custom or third-party Airflow providers before deployment, avoiding development-only or experimental components in production. 7. Apply strict API gateway or firewall rules to prevent unauthorized access to non-public APIs. 8. Educate development and operations teams about the risks of enabling development-only features in production environments. 9. Establish a patch management process to promptly apply updates and security fixes for Airflow and its providers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-12-13T16:52:31.830Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942998e034dcf4950468cea

Added to database: 12/17/2025, 11:52:46 AM

Last enriched: 12/17/2025, 11:59:30 AM

Last updated: 12/17/2025, 2:06:02 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats