Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68675: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Airflow

0
High
VulnerabilityCVE-2025-68675cvecve-2025-68675cwe-532
Published: Fri Jan 16 2026 (01/16/2026, 10:23:25 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Airflow

Description

In Apache Airflow versions before 3.1.6, and 2.11.1 the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later for Airflow 3, and 2.11.1 or later for Airflow 2 which fixes this issue

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:10:50 UTC

Technical Analysis

CVE-2025-68675 is a vulnerability classified under CWE-532 (Insertion of Sensitive Information into Log File) affecting Apache Airflow versions before 3.1.6 and 2.11.1. Apache Airflow is a widely used open-source platform for programmatically authoring, scheduling, and monitoring workflows. The vulnerability arises because proxy URLs embedded with authentication credentials within Connection objects were not treated as sensitive data by default. Consequently, when these Connection objects are rendered or logged, the proxy credentials are output in plaintext logs. This exposure can lead to unauthorized disclosure of sensitive proxy authentication information, potentially allowing attackers to misuse these credentials to access proxy services or internal networks. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and high confidentiality impact without affecting integrity or availability. The vulnerability is remotely exploitable without authentication, increasing the risk profile. Although no known exploits have been reported in the wild, the presence of sensitive data in logs presents a significant risk for credential theft and lateral movement. The issue is resolved in Apache Airflow versions 3.1.6 and 2.11.1, where proxy credentials are properly masked in logs. Users are recommended to upgrade promptly and review existing logs for potential credential exposure.

Potential Impact

The primary impact of CVE-2025-68675 is the compromise of confidentiality due to the exposure of proxy authentication credentials in log files. Organizations running vulnerable versions of Apache Airflow risk unauthorized access to proxy services if attackers gain access to logs or intercept log data. This can lead to further network reconnaissance, unauthorized data access, or lateral movement within internal networks. Since Airflow is often used in critical data pipelines and cloud environments, leaked credentials could undermine the security of connected systems and services. The vulnerability does not affect integrity or availability directly but can facilitate subsequent attacks that do. The ease of exploitation—requiring no authentication or user interaction—combined with the widespread use of Airflow in enterprises and cloud providers, elevates the threat level. Exposure of proxy credentials may also violate compliance requirements related to credential management and data protection, potentially leading to regulatory penalties and reputational damage.

Mitigation Recommendations

1. Upgrade Apache Airflow to version 3.1.6 or later if using Airflow 3.x, or to 2.11.1 or later if using Airflow 2.x, as these versions include fixes that mask proxy credentials in logs. 2. Audit existing log files for any exposure of proxy credentials and immediately rotate any credentials found to be compromised. 3. Implement strict access controls on log storage and transmission channels to minimize unauthorized access to sensitive log data. 4. Review and sanitize any custom logging configurations or plugins that might bypass default masking behavior. 5. Employ centralized log management solutions with encryption and role-based access controls to protect log integrity and confidentiality. 6. Educate DevOps and security teams about the risks of logging sensitive information and enforce secure coding and configuration practices. 7. Monitor network traffic and proxy usage for anomalous activities that could indicate misuse of leaked credentials. 8. Consider using environment variables or secure vaults for storing sensitive connection information instead of embedding credentials directly in proxy URLs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-12-23T12:02:52.278Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696a14b5b22c7ad8688c7da5

Added to database: 1/16/2026, 10:36:37 AM

Last enriched: 3/1/2026, 6:10:50 AM

Last updated: 3/26/2026, 10:34:02 AM

Views: 1082

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses