No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache airflow |
|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache airflow |
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 24 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378 | |
| Title | Apache Airflow: Connection Secrets not masked in UI when Connection are added via Airflow cli | |
| Weaknesses | CWE-201 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-02-24T15:40:05.895Z
Reserved: 2025-03-01T16:50:26.767Z
Link: CVE-2025-27555
Updated: 2026-02-24T15:37:53.389Z
Status : Analyzed
Published: 2026-02-24T10:16:02.917
Modified: 2026-02-24T21:04:58.230
Link: CVE-2025-27555
No data.
OpenCVE Enrichment
No data.