Listen to this Post
How the CVE Works
The CVE-2025-XXXXX vulnerability in Apache Airflow’s Snowflake provider (before v6.4.0) allows SQL injection via the CopyFromExternalStageToSnowflakeOperator
. Attackers can manipulate table and stage parameters due to insufficient input sanitization, enabling arbitrary SQL execution. This occurs when untrusted input is passed directly into Snowflake queries, bypassing security controls. The fix in v6.4.0 implements proper parameter sanitization to block injection attempts.
DailyCVE Form
Platform: Apache Airflow
Version: <6.4.0
Vulnerability: SQL Injection
Severity: Critical
Date: Jun 26, 2025
Prediction: Patch expected by Jun 30, 2025
What Undercode Say
Check installed version pip show apache-airflow-providers-snowflake Upgrade to fixed version pip install --upgrade apache-airflow-providers-snowflake==6.4.0
How Exploit
-- Malicious stage parameter example COPY INTO TABLE TARGET FROM @'malicious_stage' PATTERN = '.' FILE_FORMAT = (TYPE = CSV)
Protection from this CVE
- Upgrade to v6.4.0
- Validate user inputs
- Restrict operator permissions
Impact
- Unauthorized database access
- Data exfiltration
- Query manipulation
Sources:
Reported By: github.com
Extra Source Hub:
Undercode