Apache Airflow OpenSearch Provider Credentials Leak via Task Logs (CVE-2026-43826)
The OpenSearch logging provider in Apache Airflow Providers OpenSearch versions before 1.9.1 wrote host URLs containing embedded credentials into task logs, potentially exposing them to unauthorized users with task-log read permission (CVE-2026-43826).
Apache Airflow Providers OpenSearch versions before 1.9.1 are vulnerable to a credentials leak. When configured with a host URL that embeds credentials (e.g., https://user:password@server.example.com:9200), the OpenSearch logging provider writes the full host URL, including the embedded credentials, into task logs. This vulnerability, identified as CVE-2026-43826, allows any user with task-log read permission to potentially harvest the backend credentials, leading to unauthorized access or data breaches. The issue was reported on May 10, 2026, and defenders should prioritize upgrading to version 1.9.1 or later.
Attack Chain
- An administrator configures the Apache Airflow OpenSearch logging provider.
- The administrator includes credentials directly within the
hostURL of the OpenSearch configuration (e.g.,https://user:password@opensearch.example.com:9200). - Airflow executes a task that generates logs.
- The OpenSearch logging provider writes the task logs, including the full
hostURL with embedded credentials, to the Airflow task logs. - A user with read access to the Airflow task logs views the logs through the Airflow UI or API.
- The user observes the OpenSearch
hostURL, which contains the plaintext credentials. - The attacker uses the harvested credentials to access the OpenSearch cluster.
- The attacker gains unauthorized access to data stored within the OpenSearch cluster.
Impact
Successful exploitation of this vulnerability (CVE-2026-43826) allows unauthorized users with task-log read permission to obtain sensitive credentials for the OpenSearch cluster. The impact is significant as it can lead to a complete compromise of the OpenSearch backend, allowing attackers to read, modify, or delete data stored within the cluster. This vulnerability affects all Apache Airflow Providers OpenSearch installations prior to version 1.9.1 that use embedded credentials in the OpenSearch host URL.
Recommendation
- Upgrade Apache Airflow Providers OpenSearch to version 1.9.1 or later to remediate CVE-2026-43826.
- Review and sanitize existing Airflow task logs to remove any instances of embedded credentials.
- Avoid embedding credentials directly in the OpenSearch
hostURL. Use alternative authentication mechanisms such as environment variables or secrets management. - Restrict access to Airflow task logs based on the principle of least privilege.
Detection coverage 2
Detect Airflow Task Logs Containing OpenSearch Credentials (CVE-2026-43826)
mediumDetects task logs containing OpenSearch host URLs with embedded credentials, indicating a potential exposure of sensitive information (CVE-2026-43826).
Detect OpenSearch Host URL with Embedded Credentials in Process Arguments (CVE-2026-43826)
lowDetects a process using an OpenSearch host URL with embedded credentials as a command-line argument, configuration file or environment variable (CVE-2026-43826).
Detection queries are available on the platform. Get full rules →