NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-27173
Summary

JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.

Publication Date May 20, 2026, 5:16 a.m.
Registration Date May 21, 2026, 4:09 a.m.
Last Update May 20, 2026, 6:16 a.m.
CVSS3.1 : HIGH
スコア 8.7
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更あり
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Related information, measures and tools
Common Vulnerabilities List