CVE-2025-57735

critical

Description

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+ Users are recommended to upgrade to version 3.2.0, which fixes this issue.

References

https://lists.apache.org/thread/ovn8mpd8zkc604hojt7x3wsw3kc60x98

https://github.com/apache/airflow/pull/61339

https://github.com/apache/airflow/pull/56633

http://www.openwall.com/lists/oss-security/2026/04/09/16

Details

Source: Mitre, NVD

Published: 2026-04-09

Updated: 2026-04-09

Risk Information

CVSS v2

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical

EPSS

EPSS: 0.00015