Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

Posted on September 27, 2025September 27, 2025 By CWS

A vital safety flaw has emerged in Apache Airflow 3.0.3, exposing delicate connection info to customers with solely learn permissions.

The vulnerability, tracked as CVE-2025-54831 and categorised as “essential” severity, essentially undermines the platform’s meant safety mannequin for dealing with delicate knowledge inside workflow connections.

Apache Airflow model 3.0 launched important adjustments to how delicate info in connections is managed, implementing a “write-only” mannequin designed to limit entry to delicate connection fields solely to Connection Enhancing Customers.

This safety enhancement was meant to stop unauthorized entry to vital authentication particulars, database credentials, and API keys saved inside Airflow connections.

Nonetheless, the implementation in model 3.0.3 contained a vital flaw that reversed these safety enhancements.

The vulnerability permits customers with normal READ permissions to entry delicate connection info by each the Airflow API and internet person interface.

This publicity happens whatever the AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS configuration setting, which is particularly designed to masks delicate connection particulars from unauthorized customers.

The breach successfully renders the safety configuration ineffective, creating a major threat for organizations counting on Airflow’s entry controls.

Apache safety analysts recognized the vulnerability after observing surprising conduct in connection dealing with mechanisms.

The flaw particularly impacts Apache Airflow model 3.0.3, whereas earlier Airflow 2.x variations stay unaffected since they observe completely different connection dealing with protocols the place exposing delicate info to connection editors was the documented conduct.

Connection Entry Management Mechanism

The vulnerability stems from improper implementation of the connection entry management system launched in Airflow 3.0.

When customers with READ permissions question connection particulars by way of the /api/v1/connections/{connection_id} endpoint or entry the connections interface by the net UI, the system incorrectly returns delicate fields together with passwords, tokens, and connection strings that ought to stay hidden.

{
“connection_id”: “postgres_default”,
“conn_type”: “postgres”,
“host”: “localhost”,
“login”: “airflow”,
“password”: “exposed_sensitive_data”,
“schema”: “airflow”,
“port”: 5432
}

Organizations utilizing Apache Airflow 3.0.3 ought to instantly improve to model 3.0.4 or later to deal with this safety vulnerability and restore correct entry controls for delicate connection info.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Airflow, Apache, Details, Exposes, ReadOnly, Sensitive, Users, Vulnerability

Post navigation

Previous Post: Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
Next Post: Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

Related Posts

glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Identity Theft Surges as Criminals Deploy Advanced Tactics to Steal Personal Data Cyber Security News
ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns Cyber Security News
New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records Cyber Security News
Securing Virtualized Environments – Hypervisor Security Best Practices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News