An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) or the example dag code copied to build your own similar dag. If you used the `example_dag_decorator` please review it and apply the changes implemented in Airflow 3.0.5 accordingly.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* |
Thu, 30 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache airflow |
|
| Vendors & Products |
Apache
Apache airflow |
Thu, 30 Oct 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) or the example dag code copied to build your own similar dag. If you used the `example_dag_decorator` please review it and apply the changes implemented in Airflow 3.0.5 accordingly. | |
| Title | Apache Airflow: Command injection in "example_dag_decorator" | |
| Weaknesses | CWE-78 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2025-10-30T09:45:26.712Z
Updated: 2025-11-04T21:12:56.896Z
Reserved: 2025-08-01T06:55:04.376Z
Link: CVE-2025-54941
Updated: 2025-11-04T21:12:56.896Z
Status : Modified
Published: 2025-10-30T10:15:35.530
Modified: 2025-11-04T22:16:29.720
Link: CVE-2025-54941
No data.