An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 06 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Status: PUBLISHED
Assigner: apache
Published: 2020-07-16T00:00:00.000Z
Updated: 2025-10-21T23:35:39.214Z
Reserved: 2020-04-21T00:00:00.000Z
Link: CVE-2020-11978
Updated: 2024-08-04T11:48:58.274Z
Status : Analyzed
Published: 2020-07-17T00:15:10.337
Modified: 2025-10-23T14:49:31.793
Link: CVE-2020-11978
No data.