GHSA-x8mh-94wc-33gvMediumCVSS 5.9
apache-airflow-providers-smtp: No certificate validation on SMTP STARTTLS connections in SMTP provider
🔗 CVE IDs covered (1)
📋 Description
Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix.
🎯 Affected products1
- pip/apache-airflow-providers-smtp:>= 2.0.0, < 3.0.0
🔗 References (5)
- https://nvd.nist.gov/vuln/detail/CVE-2026-41016
- https://github.com/apache/airflow/pull/65346
- https://lists.apache.org/thread/gb202qy5r31bgdd3d51d7s5o1jh40kc4
- https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow-providers-smtp/PYSEC-2026-24.yaml
- https://github.com/advisories/GHSA-x8mh-94wc-33gv