BIT-airflow-2026-28779

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/airflow/BIT-airflow-2026-28779.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-airflow-2026-28779
Aliases
Published
2026-03-18T08:39:31.052Z
Modified
2026-03-18T16:56:17.351137Z
Summary
Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications
Details

Apache Airflow versions 3.1.0 through 3.1.7 session token (token) in cookies is set to path=/ regardless of the configured [webserver] baseurl or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself.

Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

Database specific
{
    "severity": "High",
    "cpes": [
        "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
    ]
}
References

Affected packages

Bitnami / airflow

Package

Name
airflow
Purl
pkg:bitnami/airflow

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
3.0.0
Fixed
3.1.8

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/airflow/BIT-airflow-2026-28779.json"