Description
In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Published: 2026-04-18
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows the exposure of full exception stack traces when SQL constraint errors occur, even though the Airflow configuration option to hide stack traces is set to false. This behavior leaks implementation details and potentially sensitive database information, which can aid attackers in crafting further exploits. The weakness is a classic example of CWE‑668: sensitive information leakage. Based on the description, it is inferred that the attack vector is through Airflow’s REST API when a user triggers a SQL constraint error.

Affected Systems

All Apache Airflow deployments that do not use the patched version released in 3.2.0 are affected, as the defect existed in all previous releases. The advisory explicitly recommends upgrading to Apache Airflow 3.2.0 or later to eliminate the exposed stack traces.

Risk and Exploitability

The CVSS score of 7.5 places this vulnerability in the high severity range. The EPSS score indicates very low exploitation probability, below 1%, and it is not listed in the CISA KEV catalog. The weakness can be exploited by sending a request that triggers a SQL constraint error via Airflow’s REST API, resulting in the unintended disclosure of exception stack traces even when the api/expose_stack_traces setting is disabled. The likely attack vector is through Airflow’s REST API when a user triggers a SQL constraint error. Because the information revealed includes implementation details and potentially sensitive database content, an attacker could use this data to facilitate further attacks.

Generated by OpenCVE AI on April 20, 2026 at 18:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Apache Airflow 3.2.0 or later to apply the vendor‑supplied fix.
  • Ensure that the 'api/expose_stack_traces' configuration option remains set to false, and that error responses do not disclose stack traces.
  • Restrict Airflow API endpoints to authenticated users only and review network exposure to limit the attack surface.

Generated by OpenCVE AI on April 20, 2026 at 18:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w7cf-2pmc-5m4c Apache Airflow exposes SQL stack trace despite "api/expose_stack_traces" set to false
History

Tue, 21 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 18 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow
Vendors & Products Apache
Apache airflow

Sat, 18 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
References

Sat, 18 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.
Title Apache Airflow: Exposing stack trace in case of constraint error
Weaknesses CWE-668
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-20T16:26:07.128Z

Reserved: 2026-03-07T13:49:05.584Z

Link: CVE-2026-30912

cve-icon Vulnrichment

Updated: 2026-04-18T06:28:57.510Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-18T07:16:10.427

Modified: 2026-04-21T14:42:49.920

Link: CVE-2026-30912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:45:14Z

Weaknesses