PT-2026-39578 · Apache · Apache Airflow Providers Elasticsearch
Aleksandr Sozinov
+1
·
Published
2026-05-11
·
Updated
2026-05-11
·
CVE-2026-41018
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
The Elasticsearch logging provider, when configured with a
host URL that embeds credentials (for example https://user:password@server.example.com:9200), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to apache-airflow-providers-elasticsearch 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the [elasticsearch] host URL.Insertion into Log File
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Apache Airflow Providers Elasticsearch