๐Ÿ” CVE Alert

CVE-2026-42526

MEDIUM 5.3

Apache Airflow Amazon provider: Prevent unauthorized access to team-scoped secrets in AWS Secrets Manager and SSM Parameter Store backends

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.

CWE CWE-863
Vendor apache software foundation
Product apache airflow amazon provider
Published May 19, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache airflow amazon provider

Be the first to know when new medium vulnerabilities affecting apache software foundation apache airflow amazon provider are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Apache Software Foundation / Apache Airflow Amazon provider
0 < 9.28.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/apache/airflow/pull/65703 lists.apache.org: https://lists.apache.org/thread/0092sz5g520d3qqjb01wd61myqlgjtyn openwall.com: http://www.openwall.com/lists/oss-security/2026/05/19/36

Credits

Justin Pakzad