Description
The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value
from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary
execution of code on the worker. Since the UI users are already highly trusted, this is a Low severity vulnerability.

It does not affect Airflow release - example_dags are not supposed to be enabled in production environment, however
users following the example could replicate the bad pattern. Documentation of Airflow 3.2.0 contains version of
the example with improved resiliance for that case.

Users who followed that pattern are advised to adjust their implementations accordingly.
Published: 2026-04-15
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

The vulnerability arises from an unsafe pattern used in the example_xcom DAG for reading XCom values, which can be exploited when a UI user with XCom modification rights triggers a race condition that leads to arbitrary code execution on an Airflow worker. The flaw allows the user to inject and execute arbitrary Python code, resulting in a remote code execution condition. Because the attack requires a trusted UI account and the example DAGs are not intended for production use, the severity is considered low, but any system that adopts the same pattern is at risk.

Affected Systems

Apache Software Foundation’s Airflow is the affected product. The issue appears only in DAGs that copy the example_xcom logic from the official documentation; it is not present in core Airflow releases. Users who have included the example DAG or otherwise implemented the same unsafe XCom access pattern could be affected. The Airflow 3.2.0 documentation has been updated with a safer version of the example, so upgrading to that or newer reduces the risk.

Risk and Exploitability

Exploitation requires a user who already has the ability to write to XComs through the Airflow UI, a privilege normally held by highly trusted individuals or processes. Because the CVSS score and EPSS are not published and the vulnerability is not listed in CISA’s KEV catalog, the overall exposure is low. An attacker would still need to insert malicious payload into an XCom and trigger the race condition to cause the worker to evaluate the payload, which is unlikely without the prerequisite UI access. Consequently, the risk is confined to environments where the example DAG is deployed or mirrored in production, and the exploitability is limited.

Generated by OpenCVE AI on April 15, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify and remove any DAGs that contain the example_xcom pattern, especially if deployed outside the documentation context.
  • Replace the unsafe XCom retrieval logic in existing DAGs with the safe method demonstrated in the Airflow 3.2.0 example, ensuring proper validation of the XCom payload.
  • Disable the default example_dags directory or configure Airflow to exclude example DAGs from being scheduled in production environments.
  • Review and restrict UI permissions so that only necessary personnel can write to XComs, reducing the likelihood of malicious payload injection.

Generated by OpenCVE AI on April 15, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
References

Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow
Vendors & Products Apache
Apache airflow

Wed, 15 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary execution of code on the worker. Since the UI users are already highly trusted, this is a Low severity vulnerability. It does not affect Airflow release - example_dags are not supposed to be enabled in production environment, however users following the example could replicate the bad pattern. Documentation of Airflow 3.2.0 contains version of the example with improved resiliance for that case. Users who followed that pattern are advised to adjust their implementations accordingly.
Title Apache Airflow: RCE by race condition in example_xcom dag
Weaknesses CWE-94
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-15T03:03:33.178Z

Reserved: 2025-07-24T21:10:16.628Z

Link: CVE-2025-54550

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-15T04:17:32.670

Modified: 2026-04-15T04:17:32.670

Link: CVE-2025-54550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T13:49:14Z

Weaknesses