Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url.
This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself.
Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
References
| Link | Resource |
|---|---|
| https://github.com/apache/airflow/pull/62771 | Issue Tracking Patch |
| https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/03/17/3 | Mailing List Third Party Advisory |
Configurations
History
17 Mar 2026, 17:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
| First Time |
Apache airflow
Apache |
|
| References | () https://github.com/apache/airflow/pull/62771 - Issue Tracking, Patch | |
| References | () https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb - Mailing List, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2026/03/17/3 - Mailing List, Third Party Advisory |
17 Mar 2026, 14:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
17 Mar 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 11:16
Updated : 2026-03-17 17:42
NVD link : CVE-2026-28779
Mitre link : CVE-2026-28779
CVE.ORG link : CVE-2026-28779
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-668
Exposure of Resource to Wrong Sphere
