top of page
perceptive_background_267k.jpg

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_u…

Published:

16 maart 2026 om 23:00:00

Alert date:

17 maart 2026 om 18:02:56

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

Apache Airflow versions 3.1.0 through 3.1.7 contain a vulnerability where session tokens in cookies are incorrectly set to path=/ regardless of configured base URLs. This misconfiguration allows any co-hosted application under the same domain to capture valid Airflow session tokens from HTTP headers, enabling complete session takeover without directly attacking Airflow. The vulnerability affects the cookie path setting mechanism and bypasses intended access restrictions. Users should upgrade to Apache Airflow 3.1.8 or later to resolve this issue. The flaw represents a significant security risk for organizations running multiple applications on shared domains.

Technical details

Mitigation steps:

Affected products:

Apache Airflow

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page