BIT-airflow-2026-33858

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/airflow/BIT-airflow-2026-33858.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-airflow-2026-33858
Aliases
Published
2026-04-16T23:38:09.491Z
Modified
2026-04-17T04:56:52.922869761Z
Summary
Apache Airflow: Unsafe Deserialization via Legacy Serialization Keys (__type/__var) Bypass in XCom API
Details

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.

Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.

Database specific
{
    "cpes": [
        "cpe:2.3:a:apache:airflow:*:*:*:*:*:python:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / airflow

Package

Name
airflow
Purl
pkg:bitnami/airflow

Severity

  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
3.1.8
Fixed
3.2.0

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/airflow/BIT-airflow-2026-33858.json"