CVE-2024-56373
Apache Airflow vulnerability analysis and mitigation

DAG Author (who already has quite a lot of permissions) could manipulate database of Airflow 2 in the way to execute arbitrary code in the web-server context, which they should normally not be able to do, leading to potentially remote code execution in the context of web-server (server-side) as a result of a user viewing historical task information.

The functionality responsible for that (log template history) has been disabled by default in 2.11.1 and users should upgrade to Airflow 3 if they want to continue to use log template history. They can also manually modify historical log file names if they want to see historical logs that were generated before the last log template change.


SourceNVD

Related Apache Airflow vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-57735CRITICAL9.1
  • Apache AirflowApache Airflow
  • airflow-3
NoYesApr 09, 2026
CVE-2026-30911HIGH8.1
  • Apache AirflowApache Airflow
  • airflow-3
NoYesMar 17, 2026
CVE-2026-28779HIGH7.5
  • Apache AirflowApache Airflow
  • airflow
NoYesMar 17, 2026
CVE-2026-34538MEDIUM6.5
  • Apache AirflowApache Airflow
  • airflow-3
NoYesApr 09, 2026
CVE-2026-32794MEDIUM4.8
  • Apache AirflowApache Airflow
  • apache-airflow
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management