Vulnerability Description
API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Airflow | >= 3.0.0, < 3.1.1 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/vbzxnxn031wb998hsd7vqnvh4z8nx6rsMailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/10/29/7Mailing ListThird Party Advisory
FAQ
What is CVE-2025-62402?
CVE-2025-62402 is a vulnerability with a CVSS score of 5.4 (MEDIUM). API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.
How severe is CVE-2025-62402?
CVE-2025-62402 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62402?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Airflow.