VYPR
Moderate severityNVD Advisory· Published Oct 30, 2025· Updated Oct 30, 2025

Apache Airflow: Privilege boundary bypass in bulk APIs (create action can upsert existing Pools/Connections/Variables)

CVE-2025-62503

Description

User with CREATE and no UPDATE privilege for Pools, Connections, Variables could update existing records via bulk create API with overwrite action.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Airflow 3.0.0 to 3.1.1 allows users with CREATE-only privileges to overwrite existing Pools, Connections, and Variables via the bulk create API's overwrite action.

Vulnerability

Overview

CVE-2025-62503 is a privilege boundary bypass vulnerability in Apache Airflow versions 3.0.0 before 3.1.1. The issue arises in the bulk create APIs for Pools, Connections, and Variables. A user who possesses only the CREATE privilege (and lacks the UPDATE privilege) on these resources can still modify existing records by using the bulk create API with an overwrite action [2][3]. This violates the intended access control separation, where CREATE should only allow insertion of new records, not modification of existing ones.

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must have a valid Airflow account with the CREATE permission on Pools, Connections, or Variables. No additional privileges are required. The attack is carried out by sending crafted requests to the bulk create endpoint with the overwrite parameter set to true, which causes the API to upsert the target record. This can be done without needing network access beyond normal API interaction [3].

Impact

A successful attack allows a low-privileged user to overwrite existing Pools, Connections, or Variables without having the intended UPDATE permission. This could lead to unauthorized modification of sensitive configuration data, such as connection strings or variable values, potentially enabling further compromise or disruption of workflows. The severity is rated as low by the project maintainers, but it bypasses an explicit security boundary [2][3].

Mitigation

The vulnerability is fixed in Apache Airflow version 3.1.1. Users running versions 3.0.0 through 3.1.0 should upgrade immediately. No workarounds are provided; the fix ensures that the bulk create API respects the UPDATE privilege requirement when overwriting existing records [3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
apache-airflowPyPI
>= 3.0.0, < 3.1.13.1.1

Affected products

1
  • Apache Software Foundation/Apache Airflowv5
    Range: 3.0.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.