Description
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url.
This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself.

Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Published: 2026-03-17
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Session Hijacking
Action: Immediate Patch
AI Analysis

Impact

Apache Airflow versions 3.1.0 through 3.1.7 set the session token cookie (_token) to path=’/’ regardless of the configured base_url. Key detail from the CVE description: this oversight allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, resulting in session hijacking. The vulnerability is classified as CWE-668 (Improper Limit on a Functionality). The impact is that an attacker who obtains a legitimate session token can perform actions on behalf of the authenticated user, potentially modifying workflows, accessing sensitive data, or escalating privileges.

Affected Systems

Known affected vendor: Apache Software Foundation – Apache Airflow. Impacted releases are 3.1.0 through 3.1.7. No information is provided about older versions or higher major releases, nor for other vendors’ products.

Risk and Exploitability

CVSS score of 7.5 indicates high severity. EPSS score is listed as <1%, suggesting a low probability of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. The attack requires a co-hosted application on the same top-level domain, which is a reasonably achievable condition in shared hosting environments. An attacker can collect the cookie from incoming request headers and reuse the token to hijack an Airflow session.

Generated by OpenCVE AI on March 17, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Airflow to version 3.1.8 or newer, which resolves the cookie path issue.

Generated by OpenCVE AI on March 17, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4fhm-p86v-hwpx Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications
History

Tue, 17 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache airflow
CPEs cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache airflow

Tue, 17 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
References

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 10:30:00 +0000

Type Values Removed Values Added
Description Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
Title Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications
Weaknesses CWE-668
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-03-17T13:45:02.518Z

Reserved: 2026-03-03T10:12:24.113Z

Link: CVE-2026-28779

cve-icon Vulnrichment

Updated: 2026-03-17T13:32:03.724Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T11:16:11.790

Modified: 2026-03-17T17:42:17.580

Link: CVE-2026-28779

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:25Z

Weaknesses