CVE-2025-69219
Apache Airflow Providers Http: Unsafe Pickle Deserialization in apache-airflow-providers-http leading to RCE via HttpOperator
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk.
| CWE | CWE-913 |
| Vendor | apache software foundation |
| Product | apache airflow providers http |
| Published | Mar 9, 2026 |
| Last Updated | Mar 10, 2026 |
Stay Ahead of the Next One
Get instant alerts for apache software foundation apache airflow providers http
Be the first to know when new high vulnerabilities affecting apache software foundation apache airflow providers http are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
Affected Versions
Apache Software Foundation / Apache Airflow Providers Http
5.1.0 < 6.0.0
References
Credits
skypher Shauryae1337 (GitHub: https://github.com/Shauryae1337) Ahmet ArtuΓ§