CVEFinder.io

CVE-2026-27173

⚠️ high
🔍 Scan for this CVE
Summary

JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.

CVSS Score
8.7
High
EPSS Score
-
Published Date
2026-05-19
First Seen: 2026-05-20
📊 Relative Risk Intelligence

This CVE is High Risk - more severe than 81.1% of all 321,566 vulnerabilities in our database.

#60,805
Top 25% most severe
Severity Percentile
🎯 CISA SSVC Assessment Updated: May 19, 2026
🔍 Exploitation Status
None
No known exploits
⚙️ Automatable
NO
Requires human interaction
💥 Technical Impact
Partial
Limited system impact
🏆 Discovered By
Nikolai Dvoinishnikov, Welltory Anton Kuznetsov, Welltory Anish Giri (remediation developer)
SSVC data provided by CISA
Last Modified 2026-05-19
Source NVD 🔗
CVSS Vector 3.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
CWE IDs (Weakness Types)

📦 Affected Products 0

No affected products information available

🔗 References 3