-
CVSS Score
-The vulnerability stems from the REST API's batch task instance endpoint not enforcing DAG-specific access controls. The GitHub PR #34315 explicitly addresses this by adding authorization checks, and the commit message states 'no restriction on the task instances a user can access' was present in this endpoint. The function name and file path are inferred from Airflow's API structure and the context of the fix.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| apache-airflow | pip | >= 0, < 2.7.2 | 2.7.2 |