CVE-2025-69219:
Apache Airflow vulnerability allows code execution through crafted database entries, potentially granting unauthorized Dag Author permissions.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.8High- Published Date:Mar 9, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.0
- EPSS Percentile:5%
Exploitability
- Score:2.8
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:LOW
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Apache Airflow vulnerability allows code execution through crafted database entries, potentially granting unauthorized Dag Author permissions.
Overview
The vulnerability (CVE-2025-69219) in Apache Airflow enables users with database access to craft entries that execute code on the Triggerer component. This could result in unauthorized elevation of privileges, granting an attacker the same permissions as a Dag Author. The vulnerability is classified as high severity with a CVSS v3.1 base score of 8.8. It requires network access and low privileges to exploit, with no user interaction needed. The potential impact on confidentiality, integrity, and availability is high. The vulnerability is associated with CWE-913, which relates to improper control of dynamically-managed code resources.
Remediation
- To address this vulnerability, it is strongly recommended to upgrade to version 6.0.0 of the Apache Airflow provider. This update eliminates the risk associated with the vulnerability. Organizations should prioritize this upgrade, especially if they cannot guarantee the security of their database access. Additionally, it's advisable to review and restrict database access permissions as an extra layer of security.
References
- [1] Apache Airflow. (2026). Pull request #61662. GitHub. https://github.com/apache/airflow/pull/61662
- [2] Apache Software Foundation. (2026). Security announcement. Apache Mailing Lists. https://lists.apache.org/thread/zjkfb2njklro68tqzym092r4w65m5dq0
- [3] Openwall. (2026). CVE-2025-69219: Apache Airflow vulnerability. OSS Security Mailing List. http://www.openwall.com/lists/oss-security/2026/03/09/1
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.