AVID-2026-R1531
Description
Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes (CVE-2024-45034)
Details
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.
Reason for inclusion in AVID: This CVE concerns Apache Airflow, a widely-used AI/ML pipeline orchestration tool. Authenticated DAG authors can execute code on the scheduler, a concrete code-execution vulnerability in software essential to building/running AI workflows. Airflow is a core component in the software supply chain for AI systems (orchestration, scheduling, deployment pipelines), so this vulnerability has direct implications for AI-related software supply chains. The CVE description and references provide clear evidence and remediation guidance.
References
- NVD entry
- https://github.com/apache/airflow/pull/41672
- https://lists.apache.org/thread/b4fcw33vh60yfg9990n5vmc7sy2dcgjx
Affected or Relevant Artifacts
- Developer: Apache Software Foundation
- Deployer: Apache Software Foundation
- Artifact Details:
| Type | Name |
|---|---|
| System | Apache Airflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-250 | CWE-250: Execution with Unnecessary Privileges |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-09-07
- Version: 0.3.3
- AVID Entry