-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from missing authorization checks in the DAG source code retrieval endpoint. The original implementation in get_dag_source() only validated the file token but didn't check if the user had 'dag read' permissions for all DAGs defined in that file. The patch added: 1) querying DAGs associated with the file location, 2) checking against get_readable_dags(), and 3) throwing PermissionDenied if any DAGs were inaccessible. The function DagCode.code() was modified to accept a session parameter, but the core vulnerability was in the endpoint's missing authorization logic rather than the DagCode class itself.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| apache-airflow | pip | >= 0, < 2.8.1rc1 | 2.8.1rc1 |
KEV Misses 88% of Exploited CVEs- Get the report