Users are recommended to upgrade to version 3.2.1 , which fixes this issue.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 24 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance records: a logged-in Airflow user with read access to at least one DAG could retrieve HITL prompts (including their request parameters) and full TaskInstance details for DAGs outside their authorized scope. Because HITL prompts and TaskInstance fields routinely carry operator parameters and free-form context attached to a task, the leak widens visibility of DAG-run data beyond the intended per-DAG RBAC boundary for every authenticated user. Users are recommended to upgrade to version 3.2.1 , which fixes this issue. | |
| Title | Apache Airflow: Dags endpoint might provide access to otherwise inaccessible entities | |
| Weaknesses | CWE-1220 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-24T14:22:02.545Z
Reserved: 2026-04-06T09:51:13.806Z
Link: CVE-2026-38743
Updated: 2026-04-24T14:21:50.580Z
Status : Awaiting Analysis
Published: 2026-04-24T13:16:21.110
Modified: 2026-04-24T15:16:47.530
Link: CVE-2026-38743
No data.
OpenCVE Enrichment
No data.