{"api_version":"1","generated_at":"2026-04-17T05:45:32+00:00","cve":"CVE-2026-31987","urls":{"html":"https://cve.report/CVE-2026-31987","api":"https://cve.report/api/cve/CVE-2026-31987.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31987","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31987"},"summary":{"title":"Apache Airflow: JWT token appearing in logs","description":"JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. \nUsers are advised to upgrade to Airflow version that contains fix.\n\nUsers are recommended to upgrade to version 3.2.0, which fixes this issue.","state":"PUBLISHED","assigner":"apache","published_at":"2026-04-16 14:16:13","updated_at":"2026-04-16 19:16:33"},"problem_types":["CWE-532","CWE-532 CWE-532 Insertion of Sensitive Information into Log File"],"metrics":[],"references":[{"url":"https://github.com/apache/airflow/pull/62964","name":"https://github.com/apache/airflow/pull/62964","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/04/16/7","name":"http://www.openwall.com/lists/oss-security/2026/04/16/7","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/apache/airflow/issues/62773","name":"https://github.com/apache/airflow/issues/62773","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/apache/airflow/issues/62428","name":"https://github.com/apache/airflow/issues/62428","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.apache.org/thread/pvsrtxzwo9xy6xgknmwslv4zrw70kt6g","name":"https://lists.apache.org/thread/pvsrtxzwo9xy6xgknmwslv4zrw70kt6g","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31987","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31987","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apache Software Foundation","product":"Apache Airflow","version":"affected 3.0.0 3.2.0 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"unixengineer","lang":"en"},{"source":"CNA","value":"Jason Imison","lang":"en"},{"source":"CNA","value":"Pineapple","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2026-04-16T18:24:29.466Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2026/04/16/7"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://pypi.python.org","defaultStatus":"unaffected","packageName":"apache-airflow","product":"Apache Airflow","vendor":"Apache Software Foundation","versions":[{"lessThan":"3.2.0","status":"affected","version":"3.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"unixengineer"},{"lang":"en","type":"finder","value":"Jason Imison"},{"lang":"en","type":"remediation developer","value":"Pineapple"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. <br>Users are advised to upgrade to Airflow version that contains fix.<br><br>Users are recommended to upgrade to version 3.2.0, which fixes this issue. <br><br>"}],"value":"JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. \nUsers are advised to upgrade to Airflow version that contains fix.\n\nUsers are recommended to upgrade to version 3.2.0, which fixes this issue."}],"metrics":[{"other":{"content":{"text":"Moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532 Insertion of Sensitive Information into Log File","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-16T13:31:52.336Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["patch"],"url":"https://github.com/apache/airflow/pull/62964"},{"tags":["issue-tracking"],"url":"https://github.com/apache/airflow/issues/62428"},{"tags":["issue-tracking"],"url":"https://github.com/apache/airflow/issues/62773"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/pvsrtxzwo9xy6xgknmwslv4zrw70kt6g"}],"source":{"discovery":"UNKNOWN"},"title":"Apache Airflow: JWT token appearing in logs","x_generator":{"engine":"airflow-s/generate_cve_json.py"}}},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2026-31987","datePublished":"2026-04-16T13:31:52.336Z","dateReserved":"2026-03-10T18:31:09.400Z","dateUpdated":"2026-04-16T18:24:29.466Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-16 14:16:13","lastModifiedDate":"2026-04-16 19:16:33","problem_types":["CWE-532","CWE-532 CWE-532 Insertion of Sensitive Information into Log File"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31987","Ordinal":"1","Title":"Apache Airflow: JWT token appearing in logs","CVE":"CVE-2026-31987","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31987","Ordinal":"1","NoteData":"JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. \nUsers are advised to upgrade to Airflow version that contains fix.\n\nUsers are recommended to upgrade to version 3.2.0, which fixes this issue.","Type":"Description","Title":"Apache Airflow: JWT token appearing in logs"}]}}}