High severity8.8NVD Advisory· Published Apr 13, 2026· Updated Apr 17, 2026
CVE-2026-33858
CVE-2026-33858
Description
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.
Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
apache-airflowPyPI | >= 3.1.8, < 3.2.0 | 3.2.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.openwall.com/lists/oss-security/2026/04/13/7nvdMailing ListThird Party AdvisoryWEB
- github.com/advisories/GHSA-mc4f-r875-v87wghsaADVISORY
- lists.apache.org/thread/1npt3o2x81s0gw9tmfcv4n7p1z9hdmy0nvdMailing ListVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-33858ghsaADVISORY
- github.com/apache/airflow/pull/64148nvdIssue TrackingWEB
News mentions
0No linked articles in our index yet.