Impact
A user who has permission to materialize assets can cause a DAG to run through the Airflow UI or API even if the user does not have explicit permission to run that DAG. The flaw allows the user to trigger any DAG that is available in the system, which could lead to execution of code defined in the DAG and therefore compromise the confidentiality, integrity, or availability of the environment. This is a classic missing-authorization weakness categorized as CWE-863.
Affected Systems
All versions of Apache Airflow prior to 3.2.0 are affected. Migrating to Airflow 3.2.0 or newer removes the vulnerability by enforcing proper authorization on DAG triggers.
Risk and Exploitability
The vulnerability requires an authenticated user with asset materialization rights, making it an insider or privileged‑user threat. No EPSS score or CVSS value is provided, and the issue is not listed in the CISA KEV catalog, but the potential impact is high because triggering a malicious DAG could provide an attacker with arbitrary code execution on the Airflow infrastructure. Exploitation would involve the user logging into the Airflow UI or making API calls to trigger the desired DAG and could be accomplished without additional privileges beyond those already granted for asset materialization.
OpenCVE Enrichment