CVE-2026-41016
ADVISORY - nistSummary
Apache Airflow's SMTP provider SmtpHook called Python's smtplib.SMTP.starttls() without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent login() call. Users are advised to upgrade to the apache-airflow-providers-smtp version that contains the fix.
EPSS Score: 0.00062 (0.192)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Certificate Validation
NIST
CREATED
UPDATED
ADVISORY IDCVE-2026-41016
EXPLOITABILITY SCORE
2.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
5.9mediumPypA
CREATED
UPDATED
ADVISORY ID
PYSEC-2026-24
EXPLOITABILITY SCORE
2.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-