Session Token Exposure in Apache Airflow by Apache
CVE-2026-28779
7.5HIGH
What is CVE-2026-28779?
Apache Airflow versions 3.1.0 through 3.1.7 contain a vulnerability where the session token (_token) in cookies is incorrectly set to path=/, regardless of the configured webserver or API base URLs. This flaw enables any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers. Such exposure permits attackers to perform full session takeover without requiring direct attacks on Airflow itself. Users are strongly advised to upgrade to Apache Airflow 3.1.8 or later to mitigate this risk.
Affected Version(s)
Apache Airflow 3.0.0 < 3.1.8