LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2024-56373

CVE-2024-56373 - Vulnerability Analysis

HighCVSS: 8.4

Last Updated: February 24, 2026

Apache Airflow - Remote Code Execution

Published: February 24, 2026Updated: February 24, 2026Remote Exploitable

Overview

Apache Airflow 2 contains a remote code execution caused by DAG author manipulation of database in log template history, letting DAG authors execute arbitrary code in web-server context, exploit requires DAG author privileges.

Severity & Score

Severity: High
CVSS Score: 8.4

Impact

DAG authors can execute arbitrary code on the web server, potentially compromising the server and its data.

Mitigation

Upgrade to Airflow 3 or disable log template history as in version 2.11.1.

Details

CVE ID
CVE-2024-56373
Severity
High
CVSS Score
8.4
Type
remote_code_execution
Status
confirmed

CWE

  • CWE-94

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H