Home

Description

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-17 | Updated 2026-03-17 | Assigner apache

Problem types

CWE-668: Exposure of Resource to Wrong Sphere

Product status

Default status
unaffected

3.0.0 (semver) before 3.1.8
affected

Credits

Daniel Wolf finder

Daniel Wolf remediation developer

References

www.openwall.com/lists/oss-security/2026/03/17/3

github.com/apache/airflow/pull/62771 patch

lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb vendor-advisory

cve.org (CVE-2026-28779)

nvd.nist.gov (CVE-2026-28779)

Download JSON