CVE-2025-68675
Published: 16 January 2026
Summary
CVE-2025-68675 is a high-severity Insertion of Sensitive Information into Log File (CWE-532) vulnerability in Apache Airflow. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 8.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Procedures mandate excluding sensitive data from logs to prevent unauthorized exposure via audit records.
Identifies insertion of sensitive data into logs, allowing detection of unauthorized disclosure.
Cross-organizational coordination enables agreement on what data to include in audit logs, directly reducing insertion of sensitive information.
Identifying logging as a data action allows prevention of sensitive information being inserted into log files.
The process of identifying and eradicating spilled information applies directly to sensitive data inserted into log files.
Specific processing rules for sensitive PII categories commonly include restrictions on logging, making insertion of such data into log files less likely.
PIAs detect planned or existing logging of PII and require removal or protection, preventing insertion of sensitive information into logs.
Limits insertion of sensitive operational details into logs by treating such data as key information requiring protection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct exposure of embedded proxy credentials in unsanitized logs enables unsecured credential access (T1552).
NVD Description
In Apache Airflow versions before 3.1.6, and 2.11.1 the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in…
more
log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later for Airflow 3, and 2.11.1 or later for Airflow 2 which fixes this issue
Deeper analysisAI
CVE-2025-68675 is an information disclosure vulnerability in Apache Airflow versions before 3.1.6 and 2.11.1. The issue stems from the proxies and proxy fields within a Connection, which can include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default, so they were not automatically masked in log output. As a result, proxy credentials could be exposed when such connections are rendered or printed to logs.
The vulnerability enables exploitation by any attacker who can access Airflow logs, such as through system access, log aggregation services, or misconfigured log storage. No special privileges, user interaction, or complex conditions are required, allowing remote attackers to obtain sensitive proxy credentials if a vulnerable Connection is configured with embedded authentication and logged.
Apache Airflow advisories recommend upgrading to version 3.1.6 or later for Airflow 3, and 2.11.1 or later for Airflow 2, which addresses the issue by properly masking these fields. Further details are provided in the GitHub pull request at https://github.com/apache/airflow/pull/59688, the Apache mailing list thread at https://lists.apache.org/thread/x6kply4nqd4vc4wgxtm6g9r2tt63s8c5, and the OSS-Security announcement at http://www.openwall.com/lists/oss-security/2026/01/15/6.
Details
- CWE(s)