Ad

CVE-2026-33858

HIGH CVSS 3.1: 8.8
Updated Apr 17, 2026
Apache
Parameter Value
CVSS 8.8 (HIGH)
Affected Versions 3.1.8 — 3.2.0
Fixed In 3.2.0
Type CWE-502 (Deserialization of Untrusted Data)
Vendor Apache
Public PoC No

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Apache Airflow
cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
3.1.8 3.2.0