Users are recommended to upgrade to version 3.2.1 , which fixes this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p3v3-229h-mc63 | Apache Airflow's authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance record |
Mon, 27 Apr 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache airflow |
|
| CPEs | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache airflow |
Fri, 24 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 24 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 24 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The authenticated /ui/dags endpoint did not enforce per-DAG access control on embedded Human-in-the-Loop (HITL) and TaskInstance records: a logged-in Airflow user with read access to at least one DAG could retrieve HITL prompts (including their request parameters) and full TaskInstance details for DAGs outside their authorized scope. Because HITL prompts and TaskInstance fields routinely carry operator parameters and free-form context attached to a task, the leak widens visibility of DAG-run data beyond the intended per-DAG RBAC boundary for every authenticated user. Users are recommended to upgrade to version 3.2.1 , which fixes this issue. | |
| Title | Apache Airflow: Dags endpoint might provide access to otherwise inaccessible entities | |
| Weaknesses | CWE-1220 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-24T16:20:26.179Z
Reserved: 2026-04-06T09:51:13.806Z
Link: CVE-2026-38743
Updated: 2026-04-24T16:20:26.179Z
Status : Analyzed
Published: 2026-04-24T13:16:21.110
Modified: 2026-04-27T12:24:28.403
Link: CVE-2026-38743
No data.
OpenCVE Enrichment
Updated: 2026-04-28T20:30:06Z
Github GHSA