Vulnerability Description
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Airflow | >= 3.0.0, < 3.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/apache/airflow/issues/62428Issue Tracking
- https://github.com/apache/airflow/issues/62773Issue Tracking
- https://github.com/apache/airflow/pull/62964Issue TrackingThird Party AdvisoryPatch
- https://lists.apache.org/thread/pvsrtxzwo9xy6xgknmwslv4zrw70kt6gMailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2026/04/16/7Mailing ListThird Party Advisory
FAQ
What is CVE-2026-31987?
CVE-2026-31987 is a vulnerability with a CVSS score of 7.5 (HIGH). JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to...
How severe is CVE-2026-31987?
CVE-2026-31987 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31987?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Airflow.