Vulnerability Description
The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:[email protected]:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Apache-Airflow-Providers-Elasticsearch | < 6.5.3 |
Related Weaknesses (CWE)
References
- https://github.com/apache/airflow/pull/65349Issue TrackingPatch
- https://lists.apache.org/thread/wz5l58drprmwlv6jxnq466x24jqbbhp7Mailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2026/05/10/3Mailing ListThird Party Advisory
FAQ
What is CVE-2026-41018?
CVE-2026-41018 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:[email protected]:9200`), wrote the full host URL — including the emb...
How severe is CVE-2026-41018?
CVE-2026-41018 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41018?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Apache-Airflow-Providers-Elasticsearch.