Impact
A JWT token used by KubernetesExecutor workers is placed in the process command line, allowing users with only read-only access to pods to retrieve the token and use Airflow's Task SDK to perform privileged actions, potentially altering the Airflow database. The confidentiality and integrity of the system are therefore compromised.
Affected Systems
The vulnerability affects the Apache Airflow CNCF Kubernetes provider distributed by the Apache Software Foundation; specific product versions are not listed in the advisory and the issue applies to any installation that uses the KubernetesExecutor without the recent fix.
Risk and Exploitability
With a CVSS score of 8.7 the issue is considered high severity, yet its EPSS score is not provided and it is not catalogued in CISA KEV. The attack requires the attacker to have read-only Kubernetes pod access, which in many environments is available to staff or users with minimal privileges. Once the token is captured, the attacker can use the Airflow Task SDK to modify task state or alter database entries. The lack of an external escalation path suggests the risk is limited to the cluster but still serious for any deployment that exposes pods to untrusted users.
OpenCVE Enrichment