Description
Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom result values even to users who only have DAG Run read permissions, such as the Viewer role.This behavior conflicts with the FAB RBAC model, which treats XCom as a separate protected resource, and with the security model documentation that defines the Viewer role as read-only.

Airflow uses the FAB Auth Manager to manage access control on a per-resource basis. The Viewer role is intended to be read-only by default, and the security model documentation defines Viewer users as those who can inspect DAGs without accessing sensitive execution results.

Users are recommended to upgrade to Apache Airflow 3.2.0 which resolves this issue.
Published: 2026-04-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass leading to unauthorized XCom exposure
Action: Immediate Patch
AI Analysis

Impact

An authorization bypass in the DagRun wait endpoint allows users with only DAG run read permissions, such as those assigned the Viewer role, to retrieve XCom result values. This violation of the FAB RBAC model and documentation that defines the Viewer role as read‑only exposes execution data that should be protected as a separate resource. The weakness is a violation of access control (CWE-668).

Affected Systems

The Apache Software Foundation’s Airflow product, specifically versions 3.0.0 through 3.1.8, is affected. Upgrading to Airflow 3.2.0 or later resolves the issue.

Risk and Exploitability

The moderate CVSS score of 6.5 and the very low EPSS probability of under 1% indicate a moderate severity but low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require authenticated access to the Airflow API’s DagRun wait endpoint, likely through an HTTP request from a user with the Viewer role; from that point the attacker can obtain XCom data that is otherwise protected.

Generated by OpenCVE AI on April 9, 2026 at 17:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to Apache Airflow 3.2.0 or later.
  • Verify that all Airflow deployments are on a fixed version and that no older snapshots remain.

Generated by OpenCVE AI on April 9, 2026 at 17:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r7vr-m4jw-r794 Apache Airflow has an authorization bypass in DagRun wait endpoint
History

Wed, 15 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow
Vendors & Products Apache
Apache airflow

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Description Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom result values even to users who only have DAG Run read permissions, such as the Viewer role.This behavior conflicts with the FAB RBAC model, which treats XCom as a separate protected resource, and with the security model documentation that defines the Viewer role as read-only. Airflow uses the FAB Auth Manager to manage access control on a per-resource basis. The Viewer role is intended to be read-only by default, and the security model documentation defines Viewer users as those who can inspect DAGs without accessing sensitive execution results. Users are recommended to upgrade to Apache Airflow 3.2.0 which resolves this issue.
Title Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure)
Weaknesses CWE-668
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-09T14:06:21.963Z

Reserved: 2026-03-30T16:07:03.425Z

Link: CVE-2026-34538

cve-icon Vulnrichment

Updated: 2026-04-09T11:21:33.223Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T10:16:22.407

Modified: 2026-04-15T17:51:58.340

Link: CVE-2026-34538

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:33:04Z

Weaknesses