The CVE described in https://www.cve.org/CVERecord?id=CVE-2025-65995
(Moderate) has also been fixed in 2.11.1.

More detailed information here
https://www.cve.org/CVERecord?id=CVE-2025-65995:

When a DAG failed during parsing, Airflow’s error-reporting in the UI could
include the full kwargs passed to the operators. If those kwargs contained
sensitive values (such as secrets), they might be exposed in the UI
tracebacks to authenticated users who had permission to view that DAG.  The
issue has been fixed in Airflow 3.1.4 and 2.11.1, and users are strongly
advised to upgrade to prevent potential disclosure of sensitive information.

J

Reply via email to