Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-41018
Received
More InfoOfficial Page
Source-security@apache.org
View Known Exploited Vulnerability (KEV) details
Published At-11 May, 2026 | 09:16
Updated At-11 May, 2026 | 10:16

The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-532Secondarysecurity@apache.org
CWE ID: CWE-532
Type: Secondary
Source: security@apache.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/apache/airflow/pull/65349security@apache.org
N/A
https://lists.apache.org/thread/wz5l58drprmwlv6jxnq466x24jqbbhp7security@apache.org
N/A
http://www.openwall.com/lists/oss-security/2026/05/10/3af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://github.com/apache/airflow/pull/65349
Source: security@apache.org
Resource: N/A
Hyperlink: https://lists.apache.org/thread/wz5l58drprmwlv6jxnq466x24jqbbhp7
Source: security@apache.org
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/05/10/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found