Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 01 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache airflow
|
|
| CPEs | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache airflow
|
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache airflow Providers Smtp |
|
| Vendors & Products |
Apache
Apache airflow Providers Smtp |
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 30 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix. | |
| Title | Apache Airflow Providers SMTP: No certificate validation on SMTP STARTTLS connections in SMTP provider | |
| Weaknesses | CWE-295 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-30T13:17:14.490Z
Reserved: 2026-04-16T02:38:58.158Z
Link: CVE-2026-41016
Updated: 2026-04-30T13:17:11.334Z
Status : Analyzed
Published: 2026-04-30T10:16:01.930
Modified: 2026-05-01T17:54:49.593
Link: CVE-2026-41016
No data.
OpenCVE Enrichment
Updated: 2026-05-02T08:15:16Z