PT-2026-39578 · Apache · Apache Airflow Providers Elasticsearch

Aleksandr Sozinov

+1

·

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-41018

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
The Elasticsearch logging provider, when configured with a host URL that embeds credentials (for example https://user:password@server.example.com:9200), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to apache-airflow-providers-elasticsearch 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the [elasticsearch] host URL.

Insertion into Log File

Weakness Enumeration

Related Identifiers

CVE-2026-41018

Affected Products

Apache Airflow Providers Elasticsearch