CVE-2026-28779: CWE-668: Exposure of Resource to Wrong Sphere in Apache Software Foundation Apache Airflow
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
AI Analysis
Technical Summary
CVE-2026-28779 is a security vulnerability identified in Apache Airflow, an open-source platform widely used for programmatically authoring, scheduling, and monitoring workflows. The flaw exists in versions 3.1.0 through 3.1.7, where the session token cookie named '_token' is incorrectly set with the path attribute as '/' regardless of the configured [webserver] base_url or [api] base_url. This cookie path setting causes the session token to be accessible to any application hosted under the same domain, even if those applications are unrelated to Airflow. Consequently, if an attacker gains control over or can inject code into any co-hosted application on the same domain, they can capture the valid Airflow session tokens from HTTP request headers. This enables full session hijacking, allowing the attacker to impersonate legitimate Airflow users and gain unauthorized access to the Airflow environment without needing to exploit Airflow directly. The vulnerability is classified under CWE-668, which relates to exposure of resources to an incorrect sphere, indicating improper access control or boundary enforcement. The issue does not require user interaction or authentication to exploit once the attacker controls a co-hosted application. Apache Airflow 3.1.8 and later versions have fixed this issue by correctly scoping the session cookie path according to the configured base URLs, preventing cross-application token exposure. No public exploits or active attacks have been reported at the time of disclosure, but the risk remains significant due to the potential for session takeover.
Potential Impact
The impact of CVE-2026-28779 is substantial for organizations using Apache Airflow versions 3.1.0 through 3.1.7, especially those hosting multiple applications under the same domain. Attackers who control or compromise any co-hosted application can steal session tokens and fully hijack Airflow user sessions, leading to unauthorized access to sensitive workflow management, data pipelines, and potentially critical operational processes. This can result in data breaches, unauthorized modifications or deletions of workflows, disruption of automated processes, and exposure of sensitive business logic or data. Since Airflow is often used in data engineering, analytics, and operational automation, such unauthorized access could have cascading effects on data integrity and availability. The vulnerability does not require direct exploitation of Airflow itself, lowering the attack complexity and increasing the risk in multi-tenant or shared hosting environments. Organizations with strict domain sharing policies or those running Airflow alongside other web applications on the same domain are particularly at risk. The absence of known exploits in the wild currently reduces immediate threat but does not diminish the urgency of remediation given the ease of exploitation once a co-hosted application is compromised.
Mitigation Recommendations
To mitigate CVE-2026-28779, organizations should upgrade Apache Airflow to version 3.1.8 or later, where the session cookie path is correctly scoped to the configured base URLs, preventing token exposure across co-hosted applications. Until upgrading is possible, administrators should consider isolating Airflow deployments on dedicated domains or subdomains to prevent cookie sharing with other applications. Implementing strict Content Security Policies (CSP) and Subresource Integrity (SRI) can reduce the risk of cross-application script injection that might lead to token theft. Additionally, reviewing and minimizing the number of applications hosted under the same domain can reduce the attack surface. Monitoring and logging unusual session activities or token usage can help detect potential hijacking attempts early. Employing network segmentation and strict access controls around Airflow hosting environments further limits exposure. Finally, educating developers and administrators about secure cookie attributes (e.g., HttpOnly, Secure, and proper Path scoping) can prevent similar issues in future deployments.
Affected Countries
United States, Germany, United Kingdom, France, India, China, Japan, Canada, Australia, Netherlands
CVE-2026-28779: CWE-668: Exposure of Resource to Wrong Sphere in Apache Software Foundation Apache Airflow
Description
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-28779 is a security vulnerability identified in Apache Airflow, an open-source platform widely used for programmatically authoring, scheduling, and monitoring workflows. The flaw exists in versions 3.1.0 through 3.1.7, where the session token cookie named '_token' is incorrectly set with the path attribute as '/' regardless of the configured [webserver] base_url or [api] base_url. This cookie path setting causes the session token to be accessible to any application hosted under the same domain, even if those applications are unrelated to Airflow. Consequently, if an attacker gains control over or can inject code into any co-hosted application on the same domain, they can capture the valid Airflow session tokens from HTTP request headers. This enables full session hijacking, allowing the attacker to impersonate legitimate Airflow users and gain unauthorized access to the Airflow environment without needing to exploit Airflow directly. The vulnerability is classified under CWE-668, which relates to exposure of resources to an incorrect sphere, indicating improper access control or boundary enforcement. The issue does not require user interaction or authentication to exploit once the attacker controls a co-hosted application. Apache Airflow 3.1.8 and later versions have fixed this issue by correctly scoping the session cookie path according to the configured base URLs, preventing cross-application token exposure. No public exploits or active attacks have been reported at the time of disclosure, but the risk remains significant due to the potential for session takeover.
Potential Impact
The impact of CVE-2026-28779 is substantial for organizations using Apache Airflow versions 3.1.0 through 3.1.7, especially those hosting multiple applications under the same domain. Attackers who control or compromise any co-hosted application can steal session tokens and fully hijack Airflow user sessions, leading to unauthorized access to sensitive workflow management, data pipelines, and potentially critical operational processes. This can result in data breaches, unauthorized modifications or deletions of workflows, disruption of automated processes, and exposure of sensitive business logic or data. Since Airflow is often used in data engineering, analytics, and operational automation, such unauthorized access could have cascading effects on data integrity and availability. The vulnerability does not require direct exploitation of Airflow itself, lowering the attack complexity and increasing the risk in multi-tenant or shared hosting environments. Organizations with strict domain sharing policies or those running Airflow alongside other web applications on the same domain are particularly at risk. The absence of known exploits in the wild currently reduces immediate threat but does not diminish the urgency of remediation given the ease of exploitation once a co-hosted application is compromised.
Mitigation Recommendations
To mitigate CVE-2026-28779, organizations should upgrade Apache Airflow to version 3.1.8 or later, where the session cookie path is correctly scoped to the configured base URLs, preventing token exposure across co-hosted applications. Until upgrading is possible, administrators should consider isolating Airflow deployments on dedicated domains or subdomains to prevent cookie sharing with other applications. Implementing strict Content Security Policies (CSP) and Subresource Integrity (SRI) can reduce the risk of cross-application script injection that might lead to token theft. Additionally, reviewing and minimizing the number of applications hosted under the same domain can reduce the attack surface. Monitoring and logging unusual session activities or token usage can help detect potential hijacking attempts early. Employing network segmentation and strict access controls around Airflow hosting environments further limits exposure. Finally, educating developers and administrators about secure cookie attributes (e.g., HttpOnly, Secure, and proper Path scoping) can prevent similar issues in future deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-03-03T10:12:24.113Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69b92cc9771bdb17499ac8a6
Added to database: 3/17/2026, 10:28:25 AM
Last enriched: 3/17/2026, 10:42:39 AM
Last updated: 3/17/2026, 11:56:17 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.