Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url.
This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself.
Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
References
| Link | Resource |
|---|---|
| https://github.com/apache/airflow/pull/62771 | Issue Tracking Patch |
| https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/03/17/3 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-17 11:16
Updated : 2026-03-17 17:42
NVD link : CVE-2026-28779
Mitre link : CVE-2026-28779
CVE.ORG link : CVE-2026-28779
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-668
Exposure of Resource to Wrong Sphere
