Vulnerability Description
Improper Certificate Validation vulnerability in Apache Airflow Provider for Databricks. Provider code did not validate certificates for connections to Databricks back-end which could result in a man-of-a-middle attack that traffic is intercepted and manipulated or credentials exfiltrated w/o notice. This issue affects Apache Airflow Provider for Databricks: from 1.10.0 before 1.12.0. Users are recommended to upgrade to version 1.12.0, which fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Airflow Providers Databricks | >= 1.10.0, < 1.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/apache/airflow/pull/63704Issue TrackingPatch
- https://lists.apache.org/thread/hn17yqsgsdtl81llvhf80rkp53hnz5nbMailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2026/03/30/9Mailing ListThird Party Advisory
FAQ
What is CVE-2026-32794?
CVE-2026-32794 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Improper Certificate Validation vulnerability in Apache Airflow Provider for Databricks. Provider code did not validate certificates for connections to Databricks back-end which could result in a man-...
How severe is CVE-2026-32794?
CVE-2026-32794 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32794?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Airflow Providers Databricks.