Impact
This vulnerability in Apache Airflow versions 3.0.0 through 3.1.7 allows any authenticated UI user who has permission to at least one DAG to view import error messages for DAGs beyond their authorized scope. The exposed error logs can reveal stack traces, underlying configuration, and other internal details that could aid future attacks. Importantly, this flaw only leaks information; it does not grant the ability to modify DAGs or execute arbitrary code.
Affected Systems
All installations running Apache Airflow 3.0.0, 3.0.1, 3.0.2, up through 3.1.7 are affected. The issue resides in the web UI component that displays DAG import errors. It impacts any environment where users have DAG-level permissions, irrespective of other security settings.
Risk and Exploitability
The CVSS score of 6.5 classifies the flaw as moderate severity, while an EPSS score of less than 1% indicates a low of exploitation. Attack vectors require an authenticated session in the Airflow UI; the attacker can then request the error view endpoint for DAGs they cannot normally access. No privilege escalation or remote code execution is possible, and the flaw is not currently recorded in the CISA KEV catalog, but it still warrants prompt patching.
OpenCVE Enrichment
Github GHSA