Impact
An authorization bypass in the DagRun wait endpoint allows users with only DAG run read permissions, such as those assigned the Viewer role, to retrieve XCom result values. This violation of the FAB RBAC model and documentation that defines the Viewer role as read‑only exposes execution data that should be protected as a separate resource. The weakness is a violation of access control (CWE-668).
Affected Systems
The Apache Software Foundation’s Airflow product, specifically versions 3.0.0 through 3.1.8, is affected. Upgrading to Airflow 3.2.0 or later resolves the issue.
Risk and Exploitability
The moderate CVSS score of 6.5 and the very low EPSS probability of under 1% indicate a moderate severity but low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require authenticated access to the Airflow API’s DagRun wait endpoint, likely through an HTTP request from a user with the Viewer role; from that point the attacker can obtain XCom data that is otherwise protected.
OpenCVE Enrichment
Github GHSA