Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g3jr-4jrm-jvqv | Apache Airflow Providers Elasticsearch: Elasticsearch task-log handlers leak credentials embedded in the host URL |
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache apache-airflow-providers-elasticsearch
|
|
| CPEs | cpe:2.3:a:apache:apache-airflow-providers-elasticsearch:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache apache-airflow-providers-elasticsearch
|
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache airflow Providers Elasticsearch |
|
| Vendors & Products |
Apache
Apache airflow Providers Elasticsearch |
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL. | |
| Title | Apache Airflow Providers Elasticsearch: Elasticsearch task-log handler leaks credentials embedded in the host URL | |
| Weaknesses | CWE-532 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-11T12:59:39.211Z
Reserved: 2026-04-16T03:09:25.534Z
Link: CVE-2026-41018
Updated: 2026-05-11T09:12:35.601Z
Status : Analyzed
Published: 2026-05-11T09:16:25.990
Modified: 2026-05-13T14:22:04.903
Link: CVE-2026-41018
No data.
OpenCVE Enrichment
Updated: 2026-05-11T17:15:40Z
Github GHSA