VYPR
Moderate severityNVD Advisory· Published Feb 24, 2026· Updated Mar 11, 2026

Apache Airflow: Connection Secrets not masked in UI when Connection are added via Airflow cli

CVE-2025-27555

Description

Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated users with audit log access in Apache Airflow <2.11.1 can see sensitive connection parameters that were set via CLI, which are stored unencrypted in audit logs.

Vulnerability

Description CVE-2025-27555 affects Apache Airflow versions prior to 2.11.1. The vulnerability arises when sensitive connection parameters (e.g., passwords, tokens) are set using the Airflow CLI. These values are logged in the audit log and stored unencrypted in the Airflow database, making them visible to any authenticated user with audit log access. This issue is related to improper masking of sensitive data during logging, similar to but distinct from CVE-2024-50378 [3].

Exploitation

Exploitation requires authenticated access to Airflow and the ability to view audit logs. An attacker with such privileges (e.g., a malicious insider or compromised user) can retrieve sensitive credentials by reading the audit log entries. The vulnerability is limited to users who already have audit log access, but it still poses a risk in environments where audit logs are widely accessible.

Impact

An attacker who exploits this vulnerability can obtain sensitive connection details, potentially leading to unauthorized access to external systems (databases, APIs, etc.) that Airflow connects to. The impact is considered moderate, but the exposure of secrets could enable lateral movement or data breaches.

Mitigation

The fix is included in Apache Airflow 2.11.1 [1][3]. Users should upgrade to this version or later. As an additional step, users who previously used the CLI to set connections should manually delete entries with sensitive values from the log table to avoid exposing historical data. Reference [2] shows a pull request that introduces masking for connection details when using JSON or URI formats.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
apache-airflowPyPI
< 2.11.12.11.1

Affected products

1
  • Apache Software Foundation/Apache Airflowv5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.