An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
History

Tue, 21 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 18 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow
Vendors & Products Apache
Apache airflow

Sat, 18 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
References

Sat, 18 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
Title Apache Airflow: Bad example of BashOperator shell injection via dag_run.conf
Weaknesses CWE-77
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2026-04-18T06:20:48.647Z

Updated: 2026-04-20T16:00:36.423Z

Reserved: 2026-03-06T16:58:56.509Z

Link: CVE-2026-30898

cve-icon Vulnrichment

Updated: 2026-04-18T06:28:55.918Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-18T07:16:10.297

Modified: 2026-04-21T14:43:36.130

Link: CVE-2026-30898

cve-icon Redhat

No data.