CVE-2020-13927

Apache Airflow's Experimental API — Apache Airflow's Experimental API Authentication Bypass
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication.

https://nvd.nist.gov/vuln/detail/CVE-2020-13927

Key Details

PropertyValue
CVE ID CVE-2020-13927
Vendor / Product Apache — Airflow's Experimental API
NVD Published2020-11-10
NVD Last Modified2025-10-23
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-306
CISA KEV Added2022-01-18
CISA KEV Deadline2022-07-18
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2022-07-18. Apply updates per vendor instructions.

Timeline

DateEvent
2022-01-18Added to CISA Known Exploited Vulnerabilities catalog
2022-07-18CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2020-13927 Vulnerability Database
CISA KEV Catalog Entry US Government