ghsa-q475-2pgm-7hvp
Vulnerability from github
Published
2025-09-26 09:31
Modified
2025-09-26 14:54
Severity ?
VLAI Severity ?
Summary
Apache Airflow: Connection sensitive details exposed to users with READ permissions
Details
Apache Airflow 3 introduced a change to the handling of sensitive information in Connections. The intent was to restrict access to sensitive connection fields to Connection Editing Users, effectively applying a "write-only" model for sensitive values.
In Airflow 3.0.3, this model was unintentionally violated: sensitive connection information could be viewed by users with READ permissions through both the API and the UI. This behavior also bypassed the AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS
configuration option.
This issue does not affect Airflow 2.x, where exposing sensitive information to connection editors was the intended and documented behavior.
Users of Airflow 3.0.3 are advised to upgrade Airflow to >=3.0.4.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "apache-airflow" }, "ranges": [ { "events": [ { "introduced": "3.0.3" }, { "fixed": "3.0.4" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.0.3" ] } ], "aliases": [ "CVE-2025-54831" ], "database_specific": { "cwe_ids": [ "CWE-213" ], "github_reviewed": true, "github_reviewed_at": "2025-09-26T14:54:17Z", "nvd_published_at": "2025-09-26T08:15:38Z", "severity": "MODERATE" }, "details": "Apache Airflow 3 introduced a change to the handling of sensitive information in Connections. The intent was to restrict access to sensitive connection fields to Connection Editing Users, effectively applying a \"write-only\" model for sensitive values.\n\nIn Airflow 3.0.3, this model was unintentionally violated: sensitive connection information could be viewed by users with READ permissions through both the API and the UI. This behavior also bypassed the `AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS` configuration option.\n\nThis issue does not affect Airflow 2.x, where exposing sensitive information to connection editors was the intended and documented behavior.\n\nUsers of Airflow 3.0.3 are advised to upgrade Airflow to \u003e=3.0.4.", "id": "GHSA-q475-2pgm-7hvp", "modified": "2025-09-26T14:54:18Z", "published": "2025-09-26T09:31:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54831" }, { "type": "PACKAGE", "url": "https://github.com/apache/airflow" }, { "type": "WEB", "url": "https://lists.apache.org/thread/vblmfqtydrp5zgn2q8tj3slk5podxspf" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U", "type": "CVSS_V4" } ], "summary": "Apache Airflow: Connection sensitive details exposed to users with READ permissions" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…