CVE-2026-31987: JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to...
HIGH
CVSS 7.5
Exploit Available
Published: April 16, 2026 | Last Modified: April 16, 2026
Description
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Ghostwire Analysis — What This Means Practically
- High CVSS score indicates significant risk — exploitation could lead to substantial data exposure or system compromise.
- Exploit code is reported to be available, increasing the likelihood of active exploitation.
This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.
Security Coverage (2 articles)
References