CVE-2024-56373 - Vulnerability Analysis
HighCVSS: 8.4Last Updated: February 24, 2026
Apache Airflow - Remote Code Execution
Published: February 24, 2026Updated: February 24, 2026Remote Exploitable
Overview
Apache Airflow 2 contains a remote code execution caused by DAG author manipulation of database in log template history, letting DAG authors execute arbitrary code in web-server context, exploit requires DAG author privileges.
Severity & Score
Severity: High
CVSS Score: 8.4
Impact
DAG authors can execute arbitrary code on the web server, potentially compromising the server and its data.
Mitigation
Upgrade to Airflow 3 or disable log template history as in version 2.11.1.
References
Related Resources
Details
- CVE ID
- CVE-2024-56373
- Severity
- High
- CVSS Score
- 8.4
- Type
- remote_code_execution
- Status
- confirmed
CWE
- CWE-94
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H