CVE-2026-30898

An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

21 Apr 2026, 14:43

Type Values Removed Values Added
First Time Apache airflow
Apache
CPE cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
References () https://github.com/apache/airflow/pull/64129 - () https://github.com/apache/airflow/pull/64129 - Issue Tracking
References () https://lists.apache.org/thread/26zmhfj1t95c1hld2r14ho81nzh1bdc8 - () https://lists.apache.org/thread/26zmhfj1t95c1hld2r14ho81nzh1bdc8 - Vendor Advisory, Mailing List
References () http://www.openwall.com/lists/oss-security/2026/04/17/7 - () http://www.openwall.com/lists/oss-security/2026/04/17/7 - Mailing List, Third Party Advisory

20 Apr 2026, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

18 Apr 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-18 07:16

Updated : 2026-04-21 14:43


NVD link : CVE-2026-30898

Mitre link : CVE-2026-30898

CVE.ORG link : CVE-2026-30898


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')