{"id":"BIT-airflow-2023-22888","summary":"Apache Airflow: Scheduler remote DoS","details":"Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected","aliases":["CVE-2023-22888","GHSA-5946-8p38-vffp","PYSEC-2023-105"],"modified":"2025-05-20T10:02:07.006Z","published":"2024-03-06T10:55:24.184Z","database_specific":{"cpes":["cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"],"severity":"Medium"},"references":[{"type":"WEB","url":"https://github.com/apache/airflow/pull/32293"},{"type":"WEB","url":"https://lists.apache.org/thread/dnlht2hvm7k81k5tgjtsfmk27c76kq7z"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22888"}],"affected":[{"package":{"name":"airflow","ecosystem":"Bitnami","purl":"pkg:bitnami/airflow"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.6.3"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/airflow/BIT-airflow-2023-22888.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.3"}