Vulnerability from bitnami_vulndb
Published
2026-04-21 12:01
Modified
2026-04-21 12:33
Summary
Apache Airflow: 3.x - Nested Variable Secret Values Bypass Redaction via max_depth=1
Details
Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked.
If you do not store variables with sensitive values in JSON form, you are not affected. Otherwise please upgrade to Apache Airflow 3.2.0 that has the fix implemented
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "airflow",
"purl": "pkg:bitnami/airflow"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0"
},
{
"fixed": "3.2.0"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-32690"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:python:*:*"
],
"severity": "Low"
},
"details": "Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked.\n\nIf you do not store variables with sensitive values in JSON form, you are not affected. Otherwise please upgrade to Apache Airflow 3.2.0 that has the fix implemented",
"id": "BIT-airflow-2026-32690",
"modified": "2026-04-21T12:33:30.555Z",
"published": "2026-04-21T12:01:40.542Z",
"references": [
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/17/6"
},
{
"type": "WEB",
"url": "https://github.com/apache/airflow/pull/63480"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/7rnzxofntcznqxnhsmjvvlvygwph7rn5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32690"
}
],
"schema_version": "1.6.2",
"summary": "Apache Airflow: 3.x - Nested Variable Secret Values Bypass Redaction via max_depth=1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…