Platform
python
Component
apache-airflow
Fixed in
3.2.0
3.2.0
CVE-2026-25917 describes a vulnerability in Apache Airflow where Dag Authors, typically trusted users, can exploit crafted XCom payloads to trigger arbitrary code execution within the webserver. This vulnerability affects versions 0.0.0 through 3.2.0. The issue is classified as low severity, and a fix is available in Apache Airflow 3.2.0.
An attacker exploiting this vulnerability could gain control over the Airflow webserver, potentially leading to data breaches, system compromise, or denial of service. The ability to execute arbitrary code within the webserver context allows for a wide range of malicious actions, including reading sensitive configuration files, modifying DAGs, or even pivoting to other systems within the network. While the vulnerability is classified as low severity due to the requirement of a trusted Dag Author, the potential impact remains significant, especially in environments with sensitive data or critical workflows.
CVE-2026-25917 was publicly disclosed on 2026-04-18. As of this date, there are no publicly available proof-of-concept exploits. The vulnerability is not currently listed on the CISA KEV catalog. Given the low severity rating and lack of public exploits, the probability of exploitation is considered low.
Exploit Status
EPSS
0.03% (9% percentile)
The primary mitigation for CVE-2026-25917 is to upgrade Apache Airflow to version 3.2.0 or later, which includes the fix. If upgrading immediately is not feasible, consider restricting the permissions of Dag Authors to minimize the potential impact. Implement strict input validation and sanitization for XCom payloads to prevent malicious code injection. Regularly review and audit Airflow configurations and DAGs for any suspicious activity.
Upgrade Apache Airflow to version 3.2.0 or later to mitigate the vulnerability. This update corrects the way XComs are deserialized, preventing malicious DAG authors from executing arbitrary code.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-25917 is a low-severity vulnerability in Apache Airflow versions 0.0.0–3.2.0 that allows a malicious Dag Author to execute arbitrary code within the webserver context through crafted XCom payloads.
You are affected if you are running Apache Airflow versions 0.0.0 through 3.2.0 and have Dag Authors with sufficient privileges to craft and execute XCom payloads.
Upgrade Apache Airflow to version 3.2.0 or later to remediate this vulnerability. Consider restricting Dag Author permissions as an interim measure.
As of the current date, there are no publicly known active exploits for CVE-2026-25917.
Refer to the official Apache Airflow security advisories for detailed information and updates regarding CVE-2026-25917: [https://airflow.apache.org/security/](https://airflow.apache.org/security/)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.