Cyber Posture

CVE-2025-68675

High

Published: 16 January 2026

Published
16 January 2026
Modified
24 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 8.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68675 is a high-severity Insertion of Sensitive Information into Log File (CWE-532) vulnerability in Apache Airflow. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 8.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Unsecured Credentials (T1552).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-532

Procedures mandate excluding sensitive data from logs to prevent unauthorized exposure via audit records.

addresses: CWE-532

Identifies insertion of sensitive data into logs, allowing detection of unauthorized disclosure.

addresses: CWE-532

Cross-organizational coordination enables agreement on what data to include in audit logs, directly reducing insertion of sensitive information.

addresses: CWE-532

Identifying logging as a data action allows prevention of sensitive information being inserted into log files.

addresses: CWE-532

The process of identifying and eradicating spilled information applies directly to sensitive data inserted into log files.

addresses: CWE-532

Specific processing rules for sensitive PII categories commonly include restrictions on logging, making insertion of such data into log files less likely.

addresses: CWE-532

PIAs detect planned or existing logging of PII and require removal or protection, preventing insertion of sensitive information into logs.

addresses: CWE-532

Limits insertion of sensitive operational details into logs by treating such data as key information requiring protection.

MITRE ATT&CK Enterprise TechniquesAI

T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Direct exposure of embedded proxy credentials in unsanitized logs enables unsecured credential access (T1552).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In Apache Airflow versions before 3.1.6, and 2.11.1 the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in…

more

log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later for Airflow 3, and 2.11.1 or later for Airflow 2 which fixes this issue

Deeper analysisAI

CVE-2025-68675 is an information disclosure vulnerability in Apache Airflow versions before 3.1.6 and 2.11.1. The issue stems from the proxies and proxy fields within a Connection, which can include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default, so they were not automatically masked in log output. As a result, proxy credentials could be exposed when such connections are rendered or printed to logs.

The vulnerability enables exploitation by any attacker who can access Airflow logs, such as through system access, log aggregation services, or misconfigured log storage. No special privileges, user interaction, or complex conditions are required, allowing remote attackers to obtain sensitive proxy credentials if a vulnerable Connection is configured with embedded authentication and logged.

Apache Airflow advisories recommend upgrading to version 3.1.6 or later for Airflow 3, and 2.11.1 or later for Airflow 2, which addresses the issue by properly masking these fields. Further details are provided in the GitHub pull request at https://github.com/apache/airflow/pull/59688, the Apache mailing list thread at https://lists.apache.org/thread/x6kply4nqd4vc4wgxtm6g9r2tt63s8c5, and the OSS-Security announcement at http://www.openwall.com/lists/oss-security/2026/01/15/6.

Details

CWE(s)

Affected Products

apache
airflow
≤ 3.1.6

CVEs Like This One

CVE-2026-31987Same product: Apache Airflow
CVE-2025-66236Same product: Apache Airflow
CVE-2025-68438Same product: Apache Airflow
CVE-2026-30911Same product: Apache Airflow
CVE-2026-30912Same product: Apache Airflow
CVE-2025-54550Same product: Apache Airflow
CVE-2026-30898Same product: Apache Airflow
CVE-2024-56373Same product: Apache Airflow
CVE-2026-25917Same product: Apache Airflow
CVE-2026-32228Same product: Apache Airflow

References