CVE-2025-54831
BaseFortify
Publication date: 2025-09-26
Last updated on: 2025-11-04
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | airflow | 3.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-213 | The product's intended functionality exposes information to certain actors in accordance with the developer's security policy, but this information is regarded as sensitive according to the intended security policies of other stakeholders such as the product's administrator, users, or others whose information is being processed. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
In Apache Airflow 3.0.3, a vulnerability exists where sensitive connection information, intended to be restricted to users with Connection Editing permissions, could be viewed by users with only READ permissions via both the API and UI. This violates the intended 'write-only' model for sensitive fields and bypasses the configuration meant to hide such data.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive connection information to users who should only have read access, potentially exposing credentials or other confidential data that should be protected.
What immediate steps should I take to mitigate this vulnerability?
Users of Airflow 3.0.3 should upgrade to Airflow version 3.0.4 or later to mitigate this vulnerability.