PT-2026-39579 · Apache · Apache Airflow Providers Opensearch
Aleksandr Sozinov
+2
·
Published
2026-05-11
·
Updated
2026-05-11
·
CVE-2026-43826
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
The OpenSearch logging provider, when configured with a
host URL that embeds credentials (for example https://user:password@server.example.com:9200), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to apache-airflow-providers-opensearch 1.9.1 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the [opensearch] host URL.Insertion into Log File
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Apache Airflow Providers Opensearch