{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T10:39:32.172","vulnerabilities":[{"cve":{"id":"CVE-2025-27555","sourceIdentifier":"security@apache.org","published":"2026-02-24T10:16:02.917","lastModified":"2026-03-11T16:16:19.393","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378"},{"lang":"es","value":"Las versiones de Airflow anteriores a la 2.11.1 tienen una vulnerabilidad que permite a los usuarios autenticados con acceso al registro de auditoría ver valores sensibles en los registros de auditoría que no deberían ver. Cuando se configuraron parámetros de conexión sensibles a través de la CLI de Airflow, los valores de esas variables aparecieron en el registro de auditoría y se almacenaron sin cifrar en la base de datos de Airflow. Si bien este riesgo está limitado a los usuarios con acceso al registro de auditoría, se recomienda actualizar a Airflow 2.11.1 o una versión posterior, que aborda este problema. Los usuarios que previamente usaron la CLI para configurar conexiones deben eliminar manualmente las entradas con esos valores sensibles de conexión de la tabla de registro. Esto es similar pero no el mismo problema que CVE-2024-50378"}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Primary","description":[{"lang":"en","value":"CWE-532"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*","versionEndExcluding":"2.11.1","matchCriteriaId":"CE505571-C239-4772-828B-050B2A942D7E"}]}]}],"references":[{"url":"https://github.com/apache/airflow/pull/61882","source":"security@apache.org","tags":["Issue Tracking"]},{"url":"https://lists.apache.org/thread/nxovkp319jo8vg498gql1yswtb2frbkw","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]}]}}]}