This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances.
You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager.
Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rv5f-ccpm-xjj4 | Apache Airflow AWS Auth Manager has Host Header Injection Leading to SAML Authentication Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 09 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL. This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances. You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager. | |
| Title | Apache Airflow AWS Auth Manager - Host Header Injection Leading to SAML Authentication Bypass | |
| Weaknesses | CWE-346 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-03-09T16:48:12.786Z
Reserved: 2026-02-03T09:59:31.342Z
Link: CVE-2026-25604
Updated: 2026-03-09T12:09:58.818Z
Status : Awaiting Analysis
Published: 2026-03-09T11:16:06.077
Modified: 2026-03-09T17:16:17.027
Link: CVE-2026-25604
No data.
OpenCVE Enrichment
No data.
Github GHSA