Home » Database

AVID-2026-R1531

Description

Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes (CVE-2024-45034)

Details

Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.

Reason for inclusion in AVID: This CVE concerns Apache Airflow, a widely-used AI/ML pipeline orchestration tool. Authenticated DAG authors can execute code on the scheduler, a concrete code-execution vulnerability in software essential to building/running AI workflows. Airflow is a core component in the software supply chain for AI systems (orchestration, scheduling, deployment pipelines), so this vulnerability has direct implications for AI-related software supply chains. The CVE description and references provide clear evidence and remediation guidance.

References

Affected or Relevant Artifacts

  • Developer: Apache Software Foundation
  • Deployer: Apache Software Foundation
  • Artifact Details:
TypeName
SystemApache Airflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-250CWE-250: Execution with Unnecessary Privileges

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-09-07
  • Version: 0.3.3
  • AVID Entry