Security Audit

Celery Security Audit

Celery is a widely used PyPI package. As of 2026-05-24, there are 4 known vulnerabilities in the OSV database. The latest stable version is 5.6.3. Developers should audit their dependency trees and update to patched versions.

Package Overview

Package
celery
Ecosystem
PyPI
Latest Version
5.6.3
License
BSD-3-Clause
Description
Distributed Task Queue.
Homepage
https://docs.celeryq.dev/

Known Vulnerabilities (4)

ID Severity Score Affected Versions Fixed In Description
CVE-2021-23727 HIGH 7.5 0 to 5.2.2 5.2.2 OS Command Injection in celery
CVE-2011-4356 MODERATE 5.0 2.1.0 to 2.2.8; 2.3.0 to 2.3.4; 2.4.0 to 2.4.4 2.2.8 Celery local privilege escalation vulnerability
CVE-2011-4356 UNKNOWN - 2.4 to 2.4.4 2.2.8 Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, c
CVE-2021-23727 UNKNOWN - 0 to 5.2.2 5.2.2 This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized.

Security Recommendations

  1. Pin Celery to the latest stable version (5.6.3) in your dependency manifest
  2. Enable automated dependency updates with Dependabot or Renovate
  3. Run regular vulnerability scans using pip-audit
  4. Review your lock file (requirements.txt) after every update
  5. Monitor the OSV database and NIST NVD for new advisories

FAQ

Is Celery safe to use?
Celery is actively maintained and widely used. As of 2026-05-24, there are 4 known vulnerabilities listed in the OSV database. Most have patches available. Keeping your dependencies updated and running regular security audits significantly reduces risk.
What vulnerabilities does Celery have?
The OSV database currently lists 4 vulnerabilities for Celery. These range in severity and are detailed in the vulnerability table above. Check the linked advisories for full technical details and remediation guidance.
How do I update Celery to fix vulnerabilities?
Run pip install --upgrade celery to get the newest version. Use pip-audit or safety check to scan for known vulnerabilities. Pin your dependencies with a requirements file and review updates regularly.

Using AI-Generated Code with Celery?

Our vibe coding security audit checks for misconfigurations, exposed secrets and vulnerable dependencies in AI-generated codebases. If your project uses Celery, we can verify it is locked to a safe version and properly configured.

Get a Vibe Coding Security Audit

Related Resources