CVE-2026-38743

The authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance records: a logged-in Airflow user with read access to at least one DAG could retrieve HITL prompts (including their request parameters) and full TaskInstance details for DAGs outside their authorized scope. Because HITL prompts and TaskInstance fields routinely carry operator parameters and free-form context attached to a task, the leak widens visibility of DAG-run data beyond the intended per-DAG RBAC boundary for every authenticated user. Users are recommended to upgrade to version 3.2.1 , which fixes this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

27 Apr 2026, 12:24

Type Values Removed Values Added
References () https://github.com/apache/airflow/pull/64822 - () https://github.com/apache/airflow/pull/64822 - Issue Tracking, Patch
References () https://lists.apache.org/thread/sk2wj0x48o8qb4p7c47gvnhjbm0mg396 - () https://lists.apache.org/thread/sk2wj0x48o8qb4p7c47gvnhjbm0mg396 - Mailing List, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2026/04/24/3 - () http://www.openwall.com/lists/oss-security/2026/04/24/3 - Mailing List, Third Party Advisory
CPE cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
First Time Apache airflow
Apache

24 Apr 2026, 17:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/04/24/3 -

24 Apr 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

24 Apr 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 13:16

Updated : 2026-04-27 12:24


NVD link : CVE-2026-38743

Mitre link : CVE-2026-38743

CVE.ORG link : CVE-2026-38743


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-1220

Insufficient Granularity of Access Control