-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| apache-airflow | pip | >= 2.4.0, < 2.9.3 | 2.9.3 |
The vulnerability stems from the get_doc_md method's template rendering logic shown in the commit diff. The original code (before patching) used jinja2.Template() and env.get_template() to process doc_md, enabling code execution via template injection. The patch removed all Jinja rendering, confirming this was the attack vector. The function's role in processing user-controlled doc_md parameters matches the CWE-94 (Code Injection) description in the advisory.
Ongoing coverage of React2Shell