An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
Use CWE-78, Apache vendor hub and Airflow product page to widen CVE-2020-11978 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-57735, CVE-2026-30898 and CVE-2026-33858 for nearby disclosures in the same product family.