CVE-2025-54550
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-94
Control incorrecto de generación de código (Inyección de código)
Fecha de publicación:
15/04/2026
Última modificación:
17/04/2026
Descripción
*** Pendiente de traducción *** The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value<br />
from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary<br />
execution of code on the worker. Since the UI users are already highly trusted, this is a Low severity vulnerability.<br />
<br />
It does not affect Airflow release - example_dags are not supposed to be enabled in production environment, however<br />
users following the example could replicate the bad pattern. Documentation of Airflow 3.2.0 contains version of<br />
the example with improved resiliance for that case.<br />
<br />
Users who followed that pattern are advised to adjust their implementations accordingly.
Impacto
Puntuación base 3.x
8.10
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | 3.2.0 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



