CVE-2026-41016
Apache Airflow Providers SMTP: No certificate validation on SMTP STARTTLS connections in SMTP provider
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix.
| CWE | CWE-295 |
| Vendor | apache software foundation |
| Product | apache airflow providers smtp |
| Published | Apr 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for apache software foundation apache airflow providers smtp
Be the first to know when new unknown vulnerabilities affecting apache software foundation apache airflow providers smtp are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Apache Software Foundation / Apache Airflow Providers SMTP
2.0.0 < 3.0.0
References
Credits
Francis Bergin (@francisbergin) Jarek Potiuk