Vulnerability Description
In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/apache/airflow/pull/65703
- https://lists.apache.org/thread/0092sz5g520d3qqjb01wd61myqlgjtyn
- http://www.openwall.com/lists/oss-security/2026/05/19/36
FAQ
What is CVE-2026-42526?
CVE-2026-42526 is a vulnerability with a CVSS score of 5.3 (MEDIUM). In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_t...
How severe is CVE-2026-42526?
CVE-2026-42526 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42526?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.