CVE-2026-41016

Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

01 May 2026, 17:54

Type Values Removed Values Added
References () https://github.com/apache/airflow/pull/65346 - () https://github.com/apache/airflow/pull/65346 - Issue Tracking, Patch
References () https://lists.apache.org/thread/gb202qy5r31bgdd3d51d7s5o1jh40kc4 - () https://lists.apache.org/thread/gb202qy5r31bgdd3d51d7s5o1jh40kc4 - Mailing List, Vendor Advisory
First Time Apache airflow
Apache
CPE cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

30 Apr 2026, 15:09

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-30 10:16

Updated : 2026-05-01 17:54


NVD link : CVE-2026-41016

Mitre link : CVE-2026-41016

CVE.ORG link : CVE-2026-41016


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-295

Improper Certificate Validation