VYPR
High severityNVD Advisory· Published Mar 17, 2026· Updated Mar 17, 2026

Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications

CVE-2026-28779

Description

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself.

Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Airflow 3.1.0–3.1.7 sets session cookie path to "/" regardless of base_url, allowing co-hosted apps on the same domain to hijack sessions.

Vulnerability

Overview

CVE-2026-28779 affects Apache Airflow versions 3.1.0 through 3.1.7. The session token (_token) cookie is always set with path=/, ignoring the configured [webserver] base_url or [api] base_url [2][3]. This means the cookie is sent by the browser to every path under the domain, not just the Airflow application's intended path.

Exploitation

Scenario

An attacker does not need not compromise Airflow itself. Any other application hosted on the same domain (e.g., a different web app on example.com/other) can read the _token cookie from incoming HTTP requests. The attacker can then use that stolen session token to impersonate the victim user against the Airflow instance [2][3]. No authentication bypass or code execution in Airflow is required; the flaw is purely in cookie scoping.

Impact

Successful exploitation leads to full session takeover. An attacker gains the same privileges as the victim user within Airflow, potentially allowing them to view, modify, or delete workflows, access sensitive data, and perform any actions the victim could [2][3]. The CVSS 4.0 vector has not yet been assigned by NVD, but the issue is rated Medium severity by the Apache project [3].

Mitigation

The fix was implemented in pull request #62771 and released in Apache Airflow 3.1.8 [3][4]. Users are strongly recommended to upgrade to 3.1.8 or later. The patch scopes the session cookie to the configured base_url, preventing it from being sent to unrelated paths on the same domain [4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
apache-airflowPyPI
>= 3.0.0, < 3.1.83.1.8

Affected products

2
  • Apache/Airflowllm-fuzzy
    Range: >=3.1.0, <=3.1.7
  • Apache Software Foundation/Apache Airflowv5
    Range: 3.0.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.