← Zuruck zu CVEs
CVE-2026-31987
HIGH7.5
Beschreibung
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/16/2026
Zuletzt geandert4/20/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apache:airflow
Schwachen (CWE)
CWE-532
Referenzen
https://github.com/apache/airflow/issues/62428(security@apache.org)
https://github.com/apache/airflow/issues/62773(security@apache.org)
https://github.com/apache/airflow/pull/62964(security@apache.org)
https://lists.apache.org/thread/pvsrtxzwo9xy6xgknmwslv4zrw70kt6g(security@apache.org)
http://www.openwall.com/lists/oss-security/2026/04/16/7(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.