An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* |
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 18 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache airflow |
|
| Vendors & Products |
Apache
Apache airflow |
Sat, 18 Apr 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 18 Apr 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice. | |
| Title | Apache Airflow: Bad example of BashOperator shell injection via dag_run.conf | |
| Weaknesses | CWE-77 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2026-04-18T06:20:48.647Z
Updated: 2026-04-20T16:00:36.423Z
Reserved: 2026-03-06T16:58:56.509Z
Link: CVE-2026-30898
Updated: 2026-04-18T06:28:55.918Z
Status : Analyzed
Published: 2026-04-18T07:16:10.297
Modified: 2026-04-21T14:43:36.130
Link: CVE-2026-30898
No data.