VYPR
Critical severity9.1NVD Advisory· Published Apr 9, 2026· Updated Apr 17, 2026

CVE-2025-57735

CVE-2025-57735

Description

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+

Users are recommended to upgrade to version 3.2.0, which fixes this issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
apache-airflowPyPI
>= 3.0.0, < 3.2.03.2.0

Affected products

1
  • cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
    Range: >=3.0.0,<3.2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.