{"id":"CVE-2025-62402","details":"API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.","aliases":["BIT-airflow-2025-62402","GHSA-273c-4g26-4jpm"],"modified":"2026-03-14T12:45:43.497549Z","published":"2025-10-30T10:15:35.647Z","references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/vbzxnxn031wb998hsd7vqnvh4z8nx6rs"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2025/10/29/7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/airflow","events":[{"introduced":"1fc3442f1307fdf5e1221b26f41266c4fed330d3"},{"fixed":"5246c009c557b4f6bdf1cd62bf9b89a2da63f630"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"3.1.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62402.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}]}