CVE-2025-67895: CWE-669: Incorrect Resource Transfer Between Spheres in Apache Software Foundation Apache Airflow Providers Edge3
Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.
AI Analysis
Technical Summary
CVE-2025-67895 is a critical vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) affecting the Apache Airflow Providers Edge3 component when deployed on Apache Airflow version 2. The Edge3 provider prior to version 2.0.0 was in a development-only state and not officially released for production use with Airflow 2. However, if installed and configured, it implicitly enabled a non-public API originally intended for testing the Edge3 provider during development. This API allowed DAG authors—users who define Directed Acyclic Graphs for workflow orchestration—to perform remote code execution (RCE) within the Airflow webserver context. This is a significant security flaw because DAG authors typically have limited permissions and should not be able to execute arbitrary code on the Airflow server. The vulnerability arises from improper separation of privileges and resource boundaries, allowing escalation of execution privileges beyond intended scopes. The Edge3 provider version 2.0.0 and later require Airflow 3 and have removed the vulnerable code paths, eliminating this attack vector. No public exploits have been reported yet, but the potential impact is severe given the nature of Airflow as a workflow orchestration platform often integrated with critical data pipelines and infrastructure. The recommended remediation is to uninstall the Edge3 provider from Airflow 2 environments and upgrade to Airflow 3 with the updated Edge3 provider version 2.0.0 or later. This vulnerability highlights the risks of using development-only components in production and the importance of strict API exposure controls.
Potential Impact
For European organizations, this vulnerability could have significant consequences, especially for those relying on Apache Airflow 2 with the Edge3 provider for orchestrating critical data workflows, ETL processes, or infrastructure automation. Successful exploitation allows a DAG author to execute arbitrary code on the Airflow webserver, potentially leading to full system compromise, data exfiltration, unauthorized access to sensitive information, and disruption of business-critical workflows. This could impact confidentiality, integrity, and availability of data and services. Organizations in sectors such as finance, healthcare, manufacturing, and telecommunications—where Airflow is commonly used for data processing and automation—are at particular risk. The ability to execute code remotely without elevated privileges or user interaction increases the attack surface and lowers the barrier for exploitation by insider threats or compromised DAG authors. Additionally, compromised Airflow instances could be leveraged as pivot points for lateral movement within enterprise networks. Given the lack of known exploits in the wild, the immediate risk may be moderate, but the potential impact of a successful attack is high.
Mitigation Recommendations
1. Immediately identify and uninstall the Edge3 provider from any Apache Airflow 2 deployments. 2. Upgrade Apache Airflow to version 3 and deploy Edge3 provider version 2.0.0 or later, which removes the vulnerable code and requires Airflow 3. 3. Review and restrict DAG author permissions to the minimum necessary, ensuring that only trusted users can create or modify DAGs. 4. Implement network segmentation and access controls to limit exposure of the Airflow webserver to trusted networks and users. 5. Monitor Airflow logs and audit trails for unusual activity, especially unexpected DAG executions or API calls. 6. Conduct a thorough security review of any custom or third-party Airflow providers before deployment, avoiding development-only or experimental components in production. 7. Apply strict API gateway or firewall rules to prevent unauthorized access to non-public APIs. 8. Educate development and operations teams about the risks of enabling development-only features in production environments. 9. Establish a patch management process to promptly apply updates and security fixes for Airflow and its providers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-67895: CWE-669: Incorrect Resource Transfer Between Spheres in Apache Software Foundation Apache Airflow Providers Edge3
Description
Edge3 Worker RPC RCE on Airflow 2. This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2. The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do. If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2. If you used Edge Provider in Airflow 3, you are not affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-67895 is a critical vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) affecting the Apache Airflow Providers Edge3 component when deployed on Apache Airflow version 2. The Edge3 provider prior to version 2.0.0 was in a development-only state and not officially released for production use with Airflow 2. However, if installed and configured, it implicitly enabled a non-public API originally intended for testing the Edge3 provider during development. This API allowed DAG authors—users who define Directed Acyclic Graphs for workflow orchestration—to perform remote code execution (RCE) within the Airflow webserver context. This is a significant security flaw because DAG authors typically have limited permissions and should not be able to execute arbitrary code on the Airflow server. The vulnerability arises from improper separation of privileges and resource boundaries, allowing escalation of execution privileges beyond intended scopes. The Edge3 provider version 2.0.0 and later require Airflow 3 and have removed the vulnerable code paths, eliminating this attack vector. No public exploits have been reported yet, but the potential impact is severe given the nature of Airflow as a workflow orchestration platform often integrated with critical data pipelines and infrastructure. The recommended remediation is to uninstall the Edge3 provider from Airflow 2 environments and upgrade to Airflow 3 with the updated Edge3 provider version 2.0.0 or later. This vulnerability highlights the risks of using development-only components in production and the importance of strict API exposure controls.
Potential Impact
For European organizations, this vulnerability could have significant consequences, especially for those relying on Apache Airflow 2 with the Edge3 provider for orchestrating critical data workflows, ETL processes, or infrastructure automation. Successful exploitation allows a DAG author to execute arbitrary code on the Airflow webserver, potentially leading to full system compromise, data exfiltration, unauthorized access to sensitive information, and disruption of business-critical workflows. This could impact confidentiality, integrity, and availability of data and services. Organizations in sectors such as finance, healthcare, manufacturing, and telecommunications—where Airflow is commonly used for data processing and automation—are at particular risk. The ability to execute code remotely without elevated privileges or user interaction increases the attack surface and lowers the barrier for exploitation by insider threats or compromised DAG authors. Additionally, compromised Airflow instances could be leveraged as pivot points for lateral movement within enterprise networks. Given the lack of known exploits in the wild, the immediate risk may be moderate, but the potential impact of a successful attack is high.
Mitigation Recommendations
1. Immediately identify and uninstall the Edge3 provider from any Apache Airflow 2 deployments. 2. Upgrade Apache Airflow to version 3 and deploy Edge3 provider version 2.0.0 or later, which removes the vulnerable code and requires Airflow 3. 3. Review and restrict DAG author permissions to the minimum necessary, ensuring that only trusted users can create or modify DAGs. 4. Implement network segmentation and access controls to limit exposure of the Airflow webserver to trusted networks and users. 5. Monitor Airflow logs and audit trails for unusual activity, especially unexpected DAG executions or API calls. 6. Conduct a thorough security review of any custom or third-party Airflow providers before deployment, avoiding development-only or experimental components in production. 7. Apply strict API gateway or firewall rules to prevent unauthorized access to non-public APIs. 8. Educate development and operations teams about the risks of enabling development-only features in production environments. 9. Establish a patch management process to promptly apply updates and security fixes for Airflow and its providers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-12-13T16:52:31.830Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942998e034dcf4950468cea
Added to database: 12/17/2025, 11:52:46 AM
Last enriched: 12/17/2025, 11:59:30 AM
Last updated: 12/17/2025, 2:06:02 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14266: CWE-352 Cross-Site Request Forgery (CSRF) in Ercom Cryptobox
LowCVE-2025-61736: CWE-298-Improper Validation of certificate expiration in Johnson Controls iSTAReX, iSTAR Edge, iSTAR Ultra LT, iSTAR Ultra , iSTAR Ultra SE
HighCVE-2025-14097: CWE-287: Improper Authentication in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers
HighCVE-2025-14096: CWE-798: Use of Hard-coded Credentials in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers
HighCVE-2025-14095: CWE-284: Improper Access Control in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.