Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

Posted on September 27, 2025September 27, 2025 By CWS

A vital safety flaw has emerged in Apache Airflow 3.0.3, exposing delicate connection info to customers with solely learn permissions.

The vulnerability, tracked as CVE-2025-54831 and categorised as “essential” severity, essentially undermines the platform’s meant safety mannequin for dealing with delicate knowledge inside workflow connections.

Apache Airflow model 3.0 launched important adjustments to how delicate info in connections is managed, implementing a “write-only” mannequin designed to limit entry to delicate connection fields solely to Connection Enhancing Customers.

This safety enhancement was meant to stop unauthorized entry to vital authentication particulars, database credentials, and API keys saved inside Airflow connections.

Nonetheless, the implementation in model 3.0.3 contained a vital flaw that reversed these safety enhancements.

The vulnerability permits customers with normal READ permissions to entry delicate connection info by each the Airflow API and internet person interface.

This publicity happens whatever the AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS configuration setting, which is particularly designed to masks delicate connection particulars from unauthorized customers.

The breach successfully renders the safety configuration ineffective, creating a major threat for organizations counting on Airflow’s entry controls.

Apache safety analysts recognized the vulnerability after observing surprising conduct in connection dealing with mechanisms.

The flaw particularly impacts Apache Airflow model 3.0.3, whereas earlier Airflow 2.x variations stay unaffected since they observe completely different connection dealing with protocols the place exposing delicate info to connection editors was the documented conduct.

Connection Entry Management Mechanism

The vulnerability stems from improper implementation of the connection entry management system launched in Airflow 3.0.

When customers with READ permissions question connection particulars by way of the /api/v1/connections/{connection_id} endpoint or entry the connections interface by the net UI, the system incorrectly returns delicate fields together with passwords, tokens, and connection strings that ought to stay hidden.

{
“connection_id”: “postgres_default”,
“conn_type”: “postgres”,
“host”: “localhost”,
“login”: “airflow”,
“password”: “exposed_sensitive_data”,
“schema”: “airflow”,
“port”: 5432
}

Organizations utilizing Apache Airflow 3.0.3 ought to instantly improve to model 3.0.4 or later to deal with this safety vulnerability and restore correct entry controls for delicate connection info.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Airflow, Apache, Details, Exposes, ReadOnly, Sensitive, Users, Vulnerability

Post navigation

Previous Post: Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
Next Post: Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

Related Posts

Surge in Attacks Targeting RSC-Enabled Services Worldwide Surge in Attacks Targeting RSC-Enabled Services Worldwide Cyber Security News
Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange Cyber Security News
New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections Cyber Security News
Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025 Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025 Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News