Description
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.
Exploits (2)
nomisec
WORKING POC
2 stars
by jakabakos · poc
https://github.com/jakabakos/CVE-2022-40127-Airflow-RCE
Nuclei Templates (1)
AirFlow < 2.4.0 - Remote Code Execution
HIGHVERIFIEDby DhiyaneshDk,ritikchaddha
Shodan:
title:"Sign In - Airflow" || http.title:"airflow - dags" || http.html:"apache airflow" || http.title:"sign in - airflow" || product:"redis"
FOFA:
title="sign in - airflow" || apache airflow || title="airflow - dags" || http.html:"apache airflow"
Scores
CVSS v3
8.8
EPSS
0.9331
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CWE
CWE-94
Status
published
Products (2)
apache/airflow
< 2.4.0
pypi/apache-airflow
0 - 2.4.0PyPI
Published
Nov 14, 2022
Tracked Since
Feb 18, 2026