Description
In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.
Published: 2026-05-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In prior versions of the Apache Airflow Amazon provider, secrets stored in AWS Secrets Manager and SSM Parameter Store could be accessed by an attacker who had privileges but no team context. The provider’s team‑scoping logic used a slash to separate team names in a conn_id (for example, "my_team/conn"). If the caller lacked a team context, the slash was interpreted literally, causing the same path to be resolved for another team’s secret. By supplying a crafted conn_id with a different team prefix, a privileged user could read a secret belonging to another team. The bug existed only for the experimental multi‑tenant teams feature. Once identified, the issue was fixed in version 9.28.0 by changing the separator to a double dash and rejecting team‑shaped conn_ids when no team context is available. Consequently, the primary impact is the potential exfiltration of confidential secrets that were meant to be team‑restricted.

Affected Systems

Affected are installations of the Apache Airflow Amazon provider older than version 9.28.0. The flaw is limited to the experimental multi‑tenant teams feature, so typical single‑team configurations are not impacted. Users of Airflow versions that still reference the old conn_id parsing logic should consider their deployment vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, implying it is not a widely exploited public exploit. The exploit requires a privileged caller that can construct a custom conn_id and no team context. In practice, this means an attacker would need higher‑level access to Airflow (or the underlying IAM role) to leverage the flaw. Nevertheless, the availability of a path that breaches team boundaries represents a non‑negligible risk, especially in environments that rely on multi‑tenant isolation.

Generated by OpenCVE AI on May 19, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the apache‑airflow‑providers‑amazon package to version 9.28.0 or later, which alters the separator and blocks non‑team context access.
  • If an immediate upgrade is not possible, restrict Airflow’s permissions so that only users with an explicit team context can execute connections, or revoke IAM permissions that allow arbitrary conn_id construction.
  • Verify that the multi‑tenant teams feature is disabled in environments that do not require it, as the flaw applies only to the experimental implementation.

Generated by OpenCVE AI on May 19, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow Amazon Provider
Vendors & Products Apache
Apache airflow Amazon Provider

Tue, 19 May 2026 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 19 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.
Title Apache Airflow Amazon provider: Prevent unauthorized access to team-scoped secrets in AWS Secrets Manager and SSM Parameter Store backends
Weaknesses CWE-863
References

Subscriptions

Apache Airflow Amazon Provider
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-19T19:53:24.129Z

Reserved: 2026-04-28T10:28:10.377Z

Link: CVE-2026-42526

cve-icon Vulnrichment

Updated: 2026-05-19T19:34:02.809Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T20:16:19.163

Modified: 2026-05-19T21:16:43.000

Link: CVE-2026-42526

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:39:03Z

Weaknesses