Session Token Exposure in Apache Airflow by Apache
CVE-2026-28779
What is CVE-2026-28779?
Apache Airflow versions 3.1.0 through 3.1.7 contain a vulnerability where the session token (_token) in cookies is incorrectly set to path=/, regardless of the configured webserver or API base URLs. This flaw enables any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers. Such exposure permits attackers to perform full session takeover without requiring direct attacks on Airflow itself. Users are strongly advised to upgrade to Apache Airflow 3.1.8 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Apache Airflow 3.0.0 < 3.1.8
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved