Impact
This vulnerability arises from missing per‑task authorization checks in Apache Airflow’s Execution API Human‑in‑the‑Loop endpoints. Because the API does not enforce task ownership, any authenticated task instance can read, approve, or reject HITL workflows belonging to other task instances. The primary consequence is unauthorized control and potential manipulation of workflows, which compromises the integrity of task orchestration and may expose sensitive workflow data. The weakness is classified as CWE‑862: Missing Authorization.
Affected Systems
Affected versions are Apache Airflow 3.1.0 through 3.1.7. All deployments running any of these releases are susceptible, regardless of the environment or scale. The issue is not limited to a specific operating system or distribution; it applies to the core Airflow application as distributed by the Apache Software Foundation.
Risk and Exploitability
The CVSS score of 8.1 indicates high severity. While the EPSS score is less than 1% and the vulnerability is not listed in the CISA KEV catalog, the presence of the bug and its impact on workflow integrity make it a real risk for environments that rely on HITL for critical operations. Exploitation requires only an authenticated user on the system, and the attack vector is effectively remote via the Execution API. The recommended remedy is to upgrade to version 3.1.8 or later, which removes the missing authorization checks.
OpenCVE Enrichment
Github GHSA