CVE-2024-45498 – apache-airflow
Package
Manager: pip
Name: apache-airflow
Vulnerable Version: =2.10.0 || >=2.10.0 <2.10.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01201 pctl0.78136
Details
Apache Airflow vulnerable to Improper Encoding or Escaping of Output Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.
Metadata
Created: 2024-09-07T09:30:31Z
Modified: 2025-06-04T21:16:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-c392-whpc-vfpr/GHSA-c392-whpc-vfpr.json
CWE IDs: ["CWE-116"]
Alternative ID: GHSA-c392-whpc-vfpr
Finding: F404
Auto approve: 1