Impact
Apache Airflow 3.1.x versions 3.1.0 through 3.1.7 expose their full DAG dependency graph via the /ui/dependencies endpoint regardless of authorization. An authenticated user who only has the DAG Dependencies permission can thus enumerate DAG IDs that they should not be able to view. The vulnerability is a classic example of incorrect authorization (CWE‑732) and allows an attacker to gain visibility into potentially sensitive workflow structures.
Affected Systems
The issue is present in Apache Airflow 3.1.0 up to and including 3.1.7. Versions 3.1.8 and later include a fix that removes the unfiltered DAG list from the endpoint.
Risk and Exploitability
The CVSS score is 4.3, indicating low to moderate severity, and the EPSS score is <1%, suggesting a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only an authenticated session with DAG Dependencies access, so the attack vector is authenticated local. Overall risk is limited to the ability to enumerate DAGs, without impact on confidentiality or integrity of data beyond visibility.
OpenCVE Enrichment
Github GHSA