A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.
You should upgrade to version 6.0.0 of the provider to avoid even that risk.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 09 Mar 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk. | |
| Title | Apache Airflow Providers Http: Unsafe Pickle Deserialization in apache-airflow-providers-http leading to RCE via HttpOperator | |
| Weaknesses | CWE-913 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2026-03-09T10:19:58.034Z
Updated: 2026-03-09T15:45:36.347Z
Reserved: 2025-12-29T17:02:57.792Z
Link: CVE-2025-69219
Updated: 2026-03-09T10:20:47.131Z
Status : Awaiting Analysis
Published: 2026-03-09T11:16:05.907
Modified: 2026-03-09T16:16:15.143
Link: CVE-2025-69219
No data.