CVE-2026-28779

7.5 HIGH
Published: March 17, 2026 Modified: March 17, 2026
View on NVD

Description

Apache Airflow versions 3.1.0 through 3.1.7Β session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/apache/airflow/pull/62771
Source: security@apache.org
Issue Tracking Patch
https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb
Source: security@apache.org
Mailing List Vendor Advisory
http://www.openwall.com/lists/oss-security/2026/03/17/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
0.1%
21th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache