CVE-2025-54831Exposure of Sensitive Information Due to Incompatible Policies in Software Foundation Apache Airflow

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 79.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 26

Description

Apache Airflow 3 introduced a change to the handling of sensitive information in Connections. The intent was to restrict access to sensitive connection fields to Connection Editing Users, effectively applying a "write-only" model for sensitive values. In Airflow 3.0.3, this model was unintentionally violated: sensitive connection information could be viewed by users with READ permissions through both the API and the UI. This behavior also bypassed the `AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FI

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

3
OSV
Apache Airflow: Connection sensitive details exposed to users with READ permissions2025-09-26
CVEList
Apache Airflow: Connection sensitive details exposed to users with READ permissions2025-09-26
GHSA
Apache Airflow: Connection sensitive details exposed to users with READ permissions2025-09-26
CVE-2025-54831 — MEDIUM severity | cvebase