CVE-2026-41018
Received Received - Intake
Elasticsearch Credential Exposure in Apache Airflow Provider

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: Apache Software Foundation

Description
The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:[email protected]:9200`), wrote the full host URL β€” including the embedded credentials β€” into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache airflow_providers_elasticsearch From 6.5.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability exposes embedded backend credentials in task logs to any user with task-log read permission, potentially leading to unauthorized access to sensitive authentication information.

Such exposure of sensitive credentials could lead to non-compliance with common security and privacy standards and regulations like GDPR and HIPAA, which require protection of sensitive data and access controls to prevent unauthorized disclosure.

Organizations using affected versions of the Apache Airflow Elasticsearch provider should upgrade to version 6.5.3 or later and avoid embedding credentials in URLs, instead using secret backends, to mitigate risks and maintain compliance.


Can you explain this vulnerability to me?

This vulnerability occurs in the Elasticsearch logging provider of Apache Airflow when it is configured with a host URL that includes embedded credentials, such as a username and password within the URL.

The issue is that the full host URL, including these embedded credentials, was written into task logs. Since any user with permission to read task logs could access these logs, they could potentially harvest the backend credentials.

The vulnerability was fixed by introducing a function to strip out the user information from the URLs before logging, so sensitive authentication details are no longer exposed in the logs.


How can this vulnerability impact me? :

If you use the Elasticsearch logging provider with embedded credentials in the host URL, this vulnerability could expose your backend authentication credentials to any user who has permission to read task logs.

This exposure could lead to unauthorized access to your Elasticsearch backend, potentially compromising your data and system integrity.

To mitigate this risk, it is recommended to upgrade to apache-airflow-providers-elasticsearch version 6.5.3 or later and to configure backend credentials using a secret backend rather than embedding them directly in the URL.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by inspecting task logs generated by the Elasticsearch logging provider in Apache Airflow to see if they contain URLs with embedded credentials (e.g., URLs containing username and password). Any presence of such URLs in task logs indicates exposure of sensitive credentials.

You can search the task logs for patterns matching URLs with embedded credentials, such as strings containing 'http://' or 'https://' followed by 'user:password@'.

  • Use command-line tools like grep to search logs for embedded credentials, for example: `grep -r -E 'https?://[^@]+@' /path/to/airflow/logs`
  • Check task logs for any entries that include full host URLs with userinfo embedded.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade the Apache Airflow Elasticsearch provider to version 6.5.3 or later, where the issue has been fixed by stripping userinfo from URLs before logging.

As a defense-in-depth measure, avoid embedding credentials directly in the Elasticsearch host URL. Instead, configure backend credentials using a secret backend mechanism.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart