CVE-2025-69219 PUBLISHED

Apache Airflow Providers Http: Unsafe Pickle Deserialization in apache-airflow-providers-http leading to RCE via HttpOperator

Assigner: apache
Reserved: 29.12.2025 Published: 09.03.2026 Updated: 09.03.2026

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.

You should upgrade to version 6.0.0 of the provider to avoid even that risk.

Product Status

Vendor Apache Software Foundation
Product Apache Airflow Providers Http
Versions Default: unaffected
  • affected from 5.1.0 to 6.0.0 (excl.)

Credits

  • skypher finder
  • Shauryae1337 (GitHub: https://github.com/Shauryae1337) finder
  • Ahmet Artuç finder

References

Problem Types

  • CWE-913: Improper Control of Dynamically-Managed Code Resources CWE