Description
Apache Airflow versions 3.0.0 through 3.1.7 FastAPI DagVersion listing API does not apply per-DAG authorization filtering when the request is made with dag_id set to "~" (wildcard for all DAGs). As a result, version metadata of DAGs that the requester is not authorized to access is returned.


Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Published: 2026-03-17
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Disclosure
Action: Patch
AI Analysis

Impact

Apache Airflow versions 3.0.0 through 3.1.7 expose a wildcard DagVersion listing API that does not apply per‑DAG authorization when the request sets dag_id to "~". This flaw, identified as CWE‑732 (Incorrect Authorization), allows an attacker to retrieve version metadata for DAGs that the requester is not allowed to see, thereby leaking potentially sensitive information about the system’s data pipelines. The primary impact is a compromise of confidentiality, as the attacker gains unauthorized visibility into DAG metadata and version history.

Affected Systems

The vulnerability affects Apache Airflow products from the Apache Software Foundation. Specifically, all releases from version 3.0.0 up to and including 3.1.7 are impacted. Users running any of these affected releases should verify their software version to determine whether they are exposed.

Risk and Exploitability

The CVSS score of 6.5 classifies the issue as moderate severity. The EPSS score of less than 1% indicates a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated API request to the FastAPI DagVersion endpoint, suggesting a network‑based attack vector that leverages legitimate Airflow credentials. While the risk is moderate, the low exploitation probability and the limited scope to metadata leakage imply that urgent action is still advisable, especially for environments exposing Airflow’s API externally.

Generated by OpenCVE AI on March 17, 2026 at 17:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to Apache Airflow 3.1.8 or later

Generated by OpenCVE AI on March 17, 2026 at 17:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4m3h-wp5w-5hqh Apache Airflow: Wildcard DagVersion Listing Bypasses Per‑DAG RBAC and Leaks Metadata
History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow
CPEs cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache airflow

Tue, 17 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
References

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Description Apache Airflow versions 3.0.0 through 3.1.7 FastAPI DagVersion listing API does not apply per-DAG authorization filtering when the request is made with dag_id set to "~" (wildcard for all DAGs). As a result, version metadata of DAGs that the requester is not authorized to access is returned. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Title Apache Airflow: Wildcard DagVersion Listing Bypasses Per‑DAG RBAC and Leaks Metadata
Weaknesses CWE-732
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-03-17T15:40:38.428Z

Reserved: 2026-02-16T12:58:50.649Z

Link: CVE-2026-26929

cve-icon Vulnrichment

Updated: 2026-03-17T13:31:59.997Z

cve-icon NVD

Status : Modified

Published: 2026-03-17T11:16:11.490

Modified: 2026-03-17T16:16:20.530

Link: CVE-2026-26929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:23Z

Weaknesses