CVE-2025-57735

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+ Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Configurations

No configuration.

History

09 Apr 2026, 18:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/04/09/16 -

09 Apr 2026, 14:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

09 Apr 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 11:16

Updated : 2026-04-13 15:02


NVD link : CVE-2025-57735

Mitre link : CVE-2025-57735

CVE.ORG link : CVE-2025-57735


JSON object : View

Products Affected

No product.

CWE
CWE-613

Insufficient Session Expiration