Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28563: CWE-732: Incorrect Permission Assignment for Critical Resource in Apache Software Foundation Apache Airflow

0
Medium
VulnerabilityCVE-2026-28563cvecve-2026-28563cwe-732
Published: Tue Mar 17 2026 (03/17/2026, 10:54:57 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Airflow

Description

CVE-2026-28563 is a vulnerability in Apache Airflow versions 3. 1. 0 through 3. 1. 7 where the /ui/dependencies endpoint exposes the full Directed Acyclic Graph (DAG) dependency graph without filtering by authorized DAG IDs. This allows any authenticated user with DAG Dependencies permission to enumerate DAGs they are not authorized to access, potentially revealing sensitive workflow information. The issue stems from incorrect permission assignment (CWE-732) on a critical resource. Although exploitation does not appear widespread, the vulnerability compromises confidentiality by unauthorized information disclosure. The Apache Software Foundation has fixed this issue in Apache Airflow 3. 1.

AI-Powered Analysis

AILast updated: 03/17/2026, 11:28:04 UTC

Technical Analysis

CVE-2026-28563 is a security vulnerability identified in Apache Airflow versions 3.1.0 through 3.1.7 that involves incorrect permission assignment (CWE-732) on the /ui/dependencies endpoint. This endpoint returns the full DAG dependency graph without filtering based on the authenticated user's authorized DAG IDs. As a result, any user with the DAG Dependencies permission can enumerate all DAGs within the Airflow environment, including those they are not authorized to view. This unauthorized enumeration can lead to exposure of sensitive workflow structures, potentially revealing business logic, operational processes, or other confidential information embedded within DAGs. The vulnerability does not allow modification or execution of unauthorized DAGs but compromises confidentiality by leaking metadata about workflows. The flaw arises because the endpoint fails to enforce proper access control checks on the DAG dependency data it returns. Apache Airflow 3.1.8 and later versions have addressed this issue by implementing appropriate filtering to restrict DAG visibility according to user permissions. There are no known exploits in the wild at this time, but the vulnerability is publicly disclosed and should be considered a risk for organizations using affected Airflow versions. The vulnerability requires authentication and the DAG Dependencies permission, which limits exposure to internal or trusted users with some level of access. However, insider threats or compromised accounts could exploit this to gain unauthorized insight into workflow configurations. The absence of a CVSS score necessitates an assessment based on impact and exploitability factors.

Potential Impact

The primary impact of CVE-2026-28563 is unauthorized information disclosure, affecting the confidentiality of workflow metadata within Apache Airflow environments. Organizations relying on Airflow for orchestrating critical business processes may inadvertently expose sensitive DAG structures to users who should not have visibility, potentially revealing proprietary operational details or security-sensitive workflow dependencies. This could facilitate further attacks by providing adversaries or malicious insiders with intelligence about internal processes. While the vulnerability does not allow direct modification or execution of unauthorized workflows, the exposure of DAG dependencies can undermine trust in the system's access controls and may violate compliance requirements related to data confidentiality. The scope is limited to authenticated users with DAG Dependencies permission, reducing the risk of external exploitation but increasing concerns about insider threats. The availability and integrity of Airflow workflows are not directly impacted by this vulnerability. However, the reputational damage and potential regulatory consequences from unauthorized data exposure could be significant for organizations in regulated industries or those with sensitive operational workflows.

Mitigation Recommendations

To mitigate CVE-2026-28563, organizations should upgrade Apache Airflow to version 3.1.8 or later, where the vulnerability has been fixed by enforcing proper access control filtering on the /ui/dependencies endpoint. Until upgrading is possible, administrators should review and restrict the assignment of the DAG Dependencies permission to only trusted users who require it for their role, minimizing the number of users who can exploit this flaw. Implement network segmentation and access controls to limit access to the Airflow UI and API endpoints to authorized personnel only. Monitor logs and audit access to the /ui/dependencies endpoint for unusual or unauthorized enumeration activities. Employ strong authentication mechanisms and consider multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Additionally, conduct regular security reviews of Airflow permissions and configurations to ensure least privilege principles are enforced. If feasible, disable or restrict access to the /ui/dependencies endpoint temporarily as a stopgap measure. Finally, maintain awareness of updates from the Apache Software Foundation and apply security patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-03-01T12:53:02.570Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b93751771bdb1749a0201b

Added to database: 3/17/2026, 11:13:21 AM

Last enriched: 3/17/2026, 11:28:04 AM

Last updated: 3/17/2026, 12:51:36 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses