Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.
Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 18 Apr 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 18 Apr 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue. | |
| Title | Apache Airflow: API extra-links triggers XCom deserialization/class instantiation (Airflow 3.1.5) | |
| Weaknesses | CWE-502 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-18T06:28:53.080Z
Reserved: 2026-02-09T11:43:28.920Z
Link: CVE-2026-25917
No data.
Status : Received
Published: 2026-04-18T07:16:09.347
Modified: 2026-04-18T07:16:09.347
Link: CVE-2026-25917
No data.
OpenCVE Enrichment
No data.
Weaknesses