Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
airflow Vendor: apache

About This Product

airflow is a software product developed by apache, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 102 known vulnerabilities affecting apache airflow. This includes 11 critical-severity issues and 25 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 66 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-12614 2018-08-06 2024-11-21 6.1 4.3 Likely
CVE-2017-15720 2019-01-23 2024-11-21 8.8 6.5 Likely
CVE-2017-17835 2019-01-23 2024-11-21 8.8 6.8 Likely
CVE-2017-17836 2019-01-23 2024-11-21 9.8 5.0 Likely
CVE-2018-20245 2019-01-23 2024-11-21 7.5 5.0 Likely
CVE-2018-20244 2019-02-27 2024-11-21 5.5 3.5 Unknown
CVE-2019-0216 2019-04-10 2024-11-21 4.8 3.5 Unknown
CVE-2019-0229 2019-04-10 2024-11-21 8.8 6.8 Likely
CVE-2019-12417 2019-10-30 2024-11-21 4.8 3.5 Unknown
CVE-2019-12398 2020-01-14 2024-11-21 4.8 3.5 Unknown
CVE-2020-11978 2020-07-17 2025-10-23 8.8 6.5 Likely
CVE-2020-11981 2020-07-17 2024-11-21 9.8 7.5 Likely
CVE-2020-11982 2020-07-17 2024-11-21 9.8 7.5 Likely
CVE-2020-11983 2020-07-17 2024-11-21 5.4 3.5 Unknown
CVE-2020-9485 2020-07-17 2024-11-21 6.1 4.3 Likely
CVE-2020-13944 2020-09-17 2024-11-21 6.1 4.3 Likely
CVE-2020-13927 2020-11-10 2025-10-23 9.8 7.5 Likely
CVE-2020-17515 2020-12-11 2024-11-21 6.1 4.3 Likely
CVE-2020-17511 2020-12-14 2024-11-21 6.5 4.0 Likely
CVE-2020-17513 2020-12-14 2024-11-21 5.3 5.0 Likely
CVE-2020-17526 2020-12-21 2024-11-21 7.7 3.5 Unknown
CVE-2021-26559 2021-02-17 2024-11-21 6.5 4.0 Likely
CVE-2021-26697 2021-02-17 2024-11-21 5.3 5.0 Likely
CVE-2021-28359 2021-05-02 2024-11-21 6.1 4.3 Likely
CVE-2021-29621 2021-06-07 2025-03-07 5.3 5.0 Likely
CVE-2021-35936 2021-08-16 2024-11-21 5.3 5.0 Likely
CVE-2021-38540 2021-09-09 2024-11-21 9.8 7.5 Likely
CVE-2021-45230 2022-01-20 2024-11-21 6.5 4.0 Likely
CVE-2021-45229 2022-02-25 2024-11-21 6.1 4.3 Likely
CVE-2022-24288 2022-02-25 2024-11-21 8.8 6.5 Likely
CVE-2022-38054 2022-09-02 2024-11-21 9.8 - -
CVE-2022-38170 2022-09-02 2024-11-21 4.7 - -
CVE-2022-40604 2022-09-21 2025-05-27 7.5 - -
CVE-2022-40754 2022-09-21 2025-05-27 6.1 - -
CVE-2022-41672 2022-10-07 2024-11-21 8.1 - -
CVE-2022-43982 2022-11-02 2025-05-02 6.1 - -
CVE-2022-43985 2022-11-02 2025-05-02 6.1 - -
CVE-2022-27949 2022-11-14 2025-04-30 7.5 - -
CVE-2022-40127 2022-11-14 2025-04-30 8.8 - -
CVE-2022-45402 2022-11-15 2025-04-30 6.1 - -
CVE-2022-38649 2022-11-22 2025-04-29 9.8 - -
CVE-2022-40189 2022-11-22 2025-04-29 9.8 - -
CVE-2022-40954 2022-11-22 2025-04-29 5.5 - -
CVE-2022-41131 2022-11-22 2025-04-29 7.8 - -
CVE-2023-22884 2023-01-21 2025-03-31 9.8 - -
CVE-2023-25695 2023-03-15 2025-02-13 5.3 - -
CVE-2023-29247 2023-05-08 2024-11-21 5.4 - -
CVE-2023-25754 2023-05-08 2025-02-13 9.8 - -
CVE-2023-35005 2023-06-19 2024-11-21 6.5 - -
CVE-2022-46651 2023-07-12 2024-11-21 6.5 - -
CVE-2023-22887 2023-07-12 2024-11-21 6.5 - -
CVE-2023-22888 2023-07-12 2024-11-21 6.5 - -
CVE-2023-35908 2023-07-12 2024-11-21 6.5 - -
CVE-2023-36543 2023-07-12 2024-11-21 6.5 - -
CVE-2023-39508 2023-08-05 2025-02-13 8.8 - -
CVE-2023-37379 2023-08-23 2025-02-13 8.1 - -
CVE-2023-39441 2023-08-23 2024-11-21 5.9 - -
CVE-2023-40273 2023-08-23 2024-11-21 8.0 - -
CVE-2023-40611 2023-09-12 2025-06-25 4.3 - -
CVE-2023-40712 2023-09-12 2024-11-21 6.5 - -
CVE-2023-42663 2023-10-14 2025-02-13 6.5 - -
CVE-2023-42780 2023-10-14 2024-11-21 6.5 - -
CVE-2023-42792 2023-10-14 2025-02-13 6.5 - -
CVE-2023-45348 2023-10-14 2025-02-13 4.3 - -
CVE-2023-46288 2023-10-23 2025-02-13 4.3 - -
CVE-2023-46215 2023-10-28 2025-06-12 7.5 - -
CVE-2023-42781 2023-11-12 2024-11-21 6.5 - -
CVE-2023-47037 2023-11-12 2025-02-13 4.3 - -
CVE-2023-47265 2023-12-21 2025-02-13 5.4 - -
CVE-2023-48291 2023-12-21 2024-11-21 4.3 - -
CVE-2023-49920 2023-12-21 2024-11-21 6.5 - -
CVE-2023-50783 2023-12-21 2024-11-21 6.5 - -
CVE-2023-50943 2024-01-24 2025-05-30 7.5 - -
CVE-2023-50944 2024-01-24 2025-06-11 6.5 - -
CVE-2023-51702 2024-01-24 2025-06-11 6.5 - -
CVE-2024-27906 2024-02-29 2025-05-06 5.9 - -
CVE-2024-26280 2024-03-01 2025-05-13 4.7 - -
CVE-2024-28746 2024-03-14 2025-03-20 8.1 - -
CVE-2024-29735 2024-03-26 2025-05-07 5.3 - -
CVE-2024-31869 2024-04-18 2025-03-13 4.3 - -
CVE-2024-32077 2024-05-14 2025-03-27 5.4 - -
CVE-2024-25142 2024-06-14 2025-03-20 5.5 - -
CVE-2024-39863 2024-07-17 2024-11-21 5.4 - -
CVE-2024-39877 2024-07-17 2024-11-21 8.8 - -
CVE-2024-42447 2024-08-05 2025-03-19 9.8 - -
CVE-2024-41937 2024-08-21 2025-03-20 6.1 - -
CVE-2024-45034 2024-09-07 2025-06-03 8.8 - -
CVE-2024-45498 2024-09-07 2025-06-03 8.8 - -
CVE-2024-50378 2024-11-08 2025-07-10 4.9 - -
CVE-2024-45784 2024-11-15 2025-06-03 7.5 - -
CVE-2025-54831 2025-09-26 2025-11-04 6.5 - -
CVE-2025-54941 2025-10-30 2025-11-04 4.6 - -
CVE-2025-62402 2025-10-30 2025-11-04 5.4 - -
CVE-2025-62503 2025-10-30 2025-11-04 4.6 - -
CVE-2025-66388 2025-12-15 2025-12-16 6.5 - -
CVE-2025-68438 2026-01-16 2026-01-21 7.5 - -
CVE-2025-68675 2026-01-16 2026-02-24 7.5 - -
CVE-2026-22922 2026-02-09 2026-02-11 6.5 - -
CVE-2026-24098 2026-02-09 2026-03-11 6.5 - -
CVE-2025-65995 2026-02-21 2026-02-25 6.5 - -
CVE-2024-56373 2026-02-24 2026-02-24 8.4 - -
CVE-2025-27555 2026-02-24 2026-03-11 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for apache airflow by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.