Apache Airflow: Wildcard DagVersion Listing Bypasses Per‑DAG RBAC and Leaks Metadata
Description
Apache Airflow versions 3.0.0 through 3.1.7 FastAPI DagVersion listing API does not apply per-DAG authorization filtering when the request is made with dag_id set to "~" (wildcard for all DAGs). As a result, version metadata of DAGs that the requester is not authorized to access is returned.
Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Airflow 3.0.0–3.1.7 FastAPI DagVersion listing API bypasses per-DAG authorization when using the wildcard dag_id "~", leaking version metadata of unauthorized DAGs.
Vulnerability
CVE-2026-26929 is an authorization bypass vulnerability in Apache Airflow versions 3.0.0 through 3.1.7. The FastAPI DagVersion listing API fails to apply per-DAG authorization filtering when the request is made with dag_id set to "~" (a wildcard representing all DAGs). This means that the API returns version metadata for DAGs even when the requester does not have the necessary permissions to access those specific DAGs [2][4].
Exploitation
An attacker can exploit this vulnerability by sending a request to the DagVersion listing API with dag_id="~". No special privileges are required beyond having access to the API endpoint, as the authorization check is simply skipped for the wildcard case. The attacker does not need to be authenticated as an administrator; any user with network access to the Airflow API can potentially enumerate version metadata of all DAGs in the environment [2][4].
Impact
Successful exploitation allows an attacker to retrieve version metadata of DAGs they are not authorized to view. This information could include version numbers, timestamps, and other metadata that may reveal sensitive details about the workflow definitions and their evolution. While this is a low-severity issue, it violates the principle of least privilege and could aid in further reconnaissance [2][4].
Mitigation
The vulnerability is fixed in Apache Airflow 3.1.8. Users running versions 3.0.0 through 3.1.7 should upgrade to 3.1.8 or later. The fix was implemented in pull request #61675, which ensures that per-DAG authorization is enforced even when the wildcard "~" is used [3][4]. No workarounds are documented; upgrading is the recommended action.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
apache-airflowPyPI | >= 3.0.0, < 3.1.8 | 3.1.8 |
Affected products
2- Apache Software Foundation/Apache Airflowv5Range: 3.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/apache/airflow/pull/61675ghsapatchWEB
- github.com/advisories/GHSA-4m3h-wp5w-5hqhghsaADVISORY
- lists.apache.org/thread/g5o6khx83jwqvdyn0mlyb0krt35cs9ssghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-26929ghsaADVISORY
- www.openwall.com/lists/oss-security/2026/03/17/4ghsaWEB
News mentions
0No linked articles in our index yet.