Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2026-27173
Summary
JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.
- LOW
- LOCAL
- HIGH
- CHANGED
- NONE
- LOW
- HIGH
- LOW
CWE-538 - Insertion of Sensitive Information into Externally-Accessible File or Directory
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.
References
Advisory Timeline
- Published