Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67895: CWE-669: Incorrect Resource Transfer Between Spheres in Apache Software Foundation Apache Airflow Providers Edge3

0
Critical
VulnerabilityCVE-2025-67895cvecve-2025-67895cwe-669
Published: Wed Dec 17 2025 (12/17/2025, 11:47:42 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Airflow Providers Edge3

Description

Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.

AI-Powered Analysis

AILast updated: 12/24/2025, 12:00:25 UTC

Technical Analysis

CVE-2025-67895 is a critical vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) affecting the Apache Airflow Providers Edge3 integration when deployed on Apache Airflow version 2. The Edge3 provider prior to version 2.0.0 was intended only for development and testing purposes and was never officially released for production use on Airflow 2. However, if installed and configured on Airflow 2, it implicitly enabled a non-public API that was designed for internal testing. This API allows DAG authors—users who define Directed Acyclic Graphs for workflow orchestration—to perform remote code execution (RCE) within the webserver context. This is a significant breach of the intended security model, as DAG authors should not have the capability to execute arbitrary code on the server hosting Airflow. The vulnerability does not affect Airflow 3 or Edge3 provider versions 2.0.0 and later, as these versions remove the vulnerable code and require Airflow 3 as a minimum version. The CVSS v3.1 score of 9.8 indicates that the vulnerability is remotely exploitable without authentication or user interaction, with a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a critical threat. The recommended remediation is to uninstall the Edge3 provider from Airflow 2 and migrate to Airflow 3 with the updated Edge3 provider version 2.0.0 or later, which eliminates the vulnerable code paths.

Potential Impact

The impact of CVE-2025-67895 on European organizations can be severe, especially for those relying on Apache Airflow 2 with the Edge3 provider for workflow automation and data pipeline orchestration. Successful exploitation allows an attacker with DAG author privileges to execute arbitrary code on the Airflow webserver, potentially leading to full system compromise, data exfiltration, disruption of critical workflows, and lateral movement within the network. This can affect confidentiality by exposing sensitive data processed by Airflow, integrity by altering workflows or injecting malicious tasks, and availability by disrupting or halting automated processes. Given that Airflow is widely used in industries such as finance, telecommunications, manufacturing, and public sector organizations across Europe, the vulnerability poses a significant risk to operational continuity and data security. The lack of authentication or user interaction requirements for exploitation increases the threat level, making it easier for malicious insiders or compromised accounts to leverage this flaw. Additionally, the vulnerability could be exploited to deploy ransomware or other malware, amplifying the potential damage. Organizations that have not upgraded to Airflow 3 or removed the vulnerable Edge3 provider are at heightened risk.

Mitigation Recommendations

To mitigate CVE-2025-67895, European organizations should take immediate and specific actions beyond generic patching advice: 1) Identify all instances of Apache Airflow 2 deployments with the Edge3 provider installed. 2) Uninstall the Edge3 provider from Airflow 2 environments as it contains the vulnerable non-public API. 3) Plan and execute a migration to Apache Airflow 3, ensuring that the Edge3 provider version is upgraded to 2.0.0 or later, which removes the vulnerable code. 4) Restrict DAG author privileges to trusted personnel only, minimizing the risk of insider exploitation. 5) Implement network segmentation and access controls to limit exposure of the Airflow webserver to untrusted networks. 6) Monitor Airflow logs and system behavior for unusual activity indicative of exploitation attempts. 7) Conduct security audits and code reviews of DAGs to detect potentially malicious or unauthorized code. 8) Stay updated with Apache Airflow security advisories and apply future patches promptly. These targeted steps will reduce the attack surface and prevent exploitation of this critical vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-12-13T16:52:31.830Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942998e034dcf4950468cea

Added to database: 12/17/2025, 11:52:46 AM

Last enriched: 12/24/2025, 12:00:25 PM

Last updated: 2/7/2026, 5:53:02 AM

Views: 226

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats