


Perceptive Security
SOC/SIEM Consultancy

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_u…
Published:
16 maart 2026 om 23:00:00
Alert date:
17 maart 2026 om 18:02:56
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Apache Airflow versions 3.1.0 through 3.1.7 contain a vulnerability where session tokens in cookies are incorrectly set to path=/ regardless of configured base URLs. This misconfiguration allows any co-hosted application under the same domain to capture valid Airflow session tokens from HTTP headers, enabling complete session takeover without directly attacking Airflow. The vulnerability affects the cookie path setting mechanism and bypasses intended access restrictions. Users should upgrade to Apache Airflow 3.1.8 or later to resolve this issue. The flaw represents a significant security risk for organizations running multiple applications on shared domains.
Technical details
Mitigation steps:
Affected products:
Apache Airflow
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28779
https://github.com/apache/airflow/pull/62771
https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb
http://www.openwall.com/lists/oss-security/2026/03/17/3
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
