Impact
Based on the description, an example in the Apache Airflow documentation shows that passing user‑provided dag_run.conf values directly into a BashOperator can cause unsanitized input to be executed as shell commands. The vulnerability is a classic command injection scenario (CWE‑77). If successfully exploited, an attacker could run arbitrary code on the worker that executes the DAG, effectively gaining remote code execution privileges on that host.
Affected Systems
All Apache Airflow installations that have adopted the documented pattern for passing dag_run.conf values to the BashOperator are potentially affected. No specific product version was listed in the advisory, so the risk applies broadly to deployments that follow the insecure pattern.
Risk and Exploitability
The likely attack vector is through the Airflow web UI or API by supplying crafted dag_run.conf data for a DAG that uses the BashOperator. Because the conf data is concatenated directly into the shell command, a single malicious entry can execute arbitrary commands with the privileges of the worker process. The CVSS score is not disclosed in the advisory, so the precise severity level cannot be quantified, but the vulnerability could enable remote code execution. EPSS is reported as <1%, indicating a low exploitation probability, and the issue is not listed in the CISA KEV catalog.
OpenCVE Enrichment