Skip to content

Commit 4a25af6

Browse files
1 parent c0da40a commit 4a25af6

1 file changed

Lines changed: 43 additions & 0 deletions

File tree

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gfw7-2v73-69wg",
4+
"modified": "2026-02-21T03:31:39Z",
5+
"published": "2026-02-21T03:31:39Z",
6+
"aliases": [
7+
"CVE-2025-65995"
8+
],
9+
"details": "When a DAG failed during parsing, Airflow’s error-reporting in the UI could include the full kwargs passed to the operators. If those kwargs contained sensitive values (such as secrets), they might be exposed in the UI tracebacks to authenticated users who had permission to view that DAG. \n\nThe issue has been fixed in Airflow 3.1.4 and 2.11.1, and users are strongly advised to upgrade to prevent potential disclosure of sensitive information.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65995"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/apache/airflow/pull/58252"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://github.com/apache/airflow/pull/61883"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://lists.apache.org/thread/1qzlrjo2wmlzs0rrgzgslj2pzkor0dr2"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "http://www.openwall.com/lists/oss-security/2025/12/12/2"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [
36+
"CWE-209"
37+
],
38+
"severity": null,
39+
"github_reviewed": false,
40+
"github_reviewed_at": null,
41+
"nvd_published_at": "2026-02-21T03:15:57Z"
42+
}
43+
}

0 commit comments

Comments
 (0)