CVE-2025-69219
March 09, 2026
A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.
You should upgrade to version 6.0.0 of the provider to avoid even that risk.
Affected Packages
https://github.com/apache/airflow.git (GITHUB):
Affected version(s) >=providers-http/5.2.0rc1 <providers-http/6.0.0Fix Suggestion:
Update to version providers-http/6.0.0apache-airflow-providers-http (PYTHON):
Affected version(s) >=5.1.0 <6.0.0Fix Suggestion:
Update to version 6.0.0apache-airflow-providers-http (PYTHON):
Affected version(s) >=1.0.0b1 <6.0.0Fix Suggestion:
Update to version 6.0.0Related ResourcesĀ (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.1
Attack Vector
LOCAL
Attack Complexity
HIGH
Attack Requirements
PRESENT
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
LOW
CVSS v3
Base Score:
6.4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Control of Dynamically-Managed Code Resources
EPSS
Base Score:
0.02