Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow-providers-amazon
  4. ›
  5. CVE-2026-25604

CVE-2026-25604: Apache Airflow AWS Auth Manager has Host Header Injection Leading to SAML Authentication Bypass

March 9, 2026 (updated March 10, 2026)

In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL. This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances.

You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager.

References

  • github.com/advisories/GHSA-rv5f-ccpm-xjj4
  • github.com/apache/airflow
  • github.com/apache/airflow/commit/1a86aec01d827ba8caf41b645db56663a9a61850
  • github.com/apache/airflow/pull/61368
  • lists.apache.org/thread/spwwrsmwxod7fpttcd7n7zs46j839l77
  • nvd.nist.gov/vuln/detail/CVE-2026-25604

Code Behaviors & Features

Detect and mitigate CVE-2026-25604 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 9.22.0

Fixed versions

  • 9.22.0

Solution

Upgrade to version 9.22.0 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-346: Origin Validation Error

Source file

pypi/apache-airflow-providers-amazon/CVE-2026-25604.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:17 +0000.