CVE-2025-5279 Affecting airflow-3 package, versions <3.0.1-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-AIRFLOW3-10336209
  • published10 Jun 2025
  • disclosed27 May 2025

Introduced: 27 May 2025

CVE-2025-5279  (opens in a new tab)

How to fix?

Upgrade Chainguard airflow-3 to version 3.0.1-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream airflow-3 package and not the airflow-3 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

When the Amazon Redshift Python Connector is configured with the BrowserAzureOAuth2CredentialsProvider plugin, the driver skips the SSL certificate validation step for the Identity Provider. An insecure connection could allow an actor to intercept the token exchange process and retrieve an access token.

This issue has been addressed in driver version 2.1.7. Users should upgrade to address this issue and ensure any forked or derivative code is patched to incorporate the new fixes.