Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.
Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.
References
| Link | Resource |
|---|---|
| https://github.com/apache/airflow/pull/64148 | Issue Tracking |
| https://lists.apache.org/thread/1npt3o2x81s0gw9tmfcv4n7p1z9hdmy0 | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/04/13/7 | Mailing List Third Party Advisory |
Configurations
History
17 Apr 2026, 18:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/apache/airflow/pull/64148 - Issue Tracking | |
| References | () https://lists.apache.org/thread/1npt3o2x81s0gw9tmfcv4n7p1z9hdmy0 - Mailing List, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2026/04/13/7 - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
| First Time |
Apache airflow
Apache |
13 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
13 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
13 Apr 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-13 15:17
Updated : 2026-04-17 18:40
NVD link : CVE-2026-33858
Mitre link : CVE-2026-33858
CVE.ORG link : CVE-2026-33858
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-502
Deserialization of Untrusted Data
