Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow-providers-http
  4. ›
  5. CVE-2025-69219

CVE-2025-69219: Apache Airflow Providers Http has Unsafe Pickle Deserializatio leading to RCE via HttpOperator

March 9, 2026 (updated March 10, 2026)

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.

Users should upgrade to version 6.0.0 of the provider to avoid even that risk.

References

  • github.com/advisories/GHSA-9r5j-7r2x-rv4g
  • github.com/apache/airflow
  • github.com/apache/airflow/commit/97839f7b0a8ae66d6079bb7fad5a363068f61617
  • github.com/apache/airflow/pull/61662
  • lists.apache.org/thread/zjkfb2njklro68tqzym092r4w65m5dq0
  • nvd.nist.gov/vuln/detail/CVE-2025-69219

Code Behaviors & Features

Detect and mitigate CVE-2025-69219 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.0.0

Fixed versions

  • 6.0.0

Solution

Upgrade to version 6.0.0 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-913: Improper Control of Dynamically-Managed Code Resources

Source file

pypi/apache-airflow-providers-http/CVE-2025-69219.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:55 +0000.