Impact
A flaw in Airflow’s asset dependency graph layer allows a user who can read any single DAG to view the graph for all assets in the deployment. The interface fails to enforce the viewer’s DAG‑read permissions, so the user can learn the existence and names of DAGs and assets that are outside the user’s authorized scope. This creates a confidentiality risk where sensitive workflow definitions become visible to unauthorized staff.
Affected Systems
Apache Software Foundation’s Apache Airflow deployments running a version earlier than 3.2.1 are impacted. The vulnerability exists across all builds of Airflow prior to the 3.2.1 release, which adds proper access‑control checks to the asset graph view.
Risk and Exploitability
The CVSS score of 4.3 rates the flaw as moderate. The EPSS score indicates a very low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a legitimate authenticated session with at least read access to one DAG, after which the attacker can view the entire asset graph via the web UI. It does not provide code execution or privilege escalation, but it allows information leakage if an insider or compromised account is used. The risk is therefore primarily lateral data disclosure rather than system compromise.
OpenCVE Enrichment
Github GHSA